WO2021218777A1 - 流量控制方法、网络设备与通信*** - Google Patents

流量控制方法、网络设备与通信*** Download PDF

Info

Publication number
WO2021218777A1
WO2021218777A1 PCT/CN2021/089038 CN2021089038W WO2021218777A1 WO 2021218777 A1 WO2021218777 A1 WO 2021218777A1 CN 2021089038 W CN2021089038 W CN 2021089038W WO 2021218777 A1 WO2021218777 A1 WO 2021218777A1
Authority
WO
WIPO (PCT)
Prior art keywords
session
rate
traffic rate
target network
flow rate
Prior art date
Application number
PCT/CN2021/089038
Other languages
English (en)
French (fr)
Inventor
李卓明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP21797614.1A priority Critical patent/EP4132088A4/en
Publication of WO2021218777A1 publication Critical patent/WO2021218777A1/zh
Priority to US18/049,740 priority patent/US20230072593A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/09Management thereof
    • H04W28/0925Management thereof using policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/22Negotiating communication rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/0827Triggering entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/41Flow control; Congestion control by acting on aggregated flows or links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Definitions

  • This application relates to the field of communication technology, and in particular to a flow control method, network equipment and communication system.
  • Network slice is a logical network with specific network characteristics divided from the operator’s communication network. It is the fifth generation (5th generation) proposed by the 3rd generation partnership project (3GPP). , 5G) mobile communication technology is a key technology for network differentiation requirements.
  • a physical network can be abstractly divided into multiple network slices, and each network slice constitutes an end-to-end logical network, which is logically isolated from each other.
  • Network slicing resources are not unlimited. Therefore, during the operation of network slicing, the network bandwidth used by each packet data unit session (oacket data unit session, PDU Session) in the network slicing needs to be restricted and controlled to ensure the normal operation of the network slicing. How to achieve flow control for network slicing has become an important technical problem faced by those skilled in the art.
  • This application provides a flow control method, network equipment, and communication system to limit the authorized flow rate of the first session that is newly accessed, so as to realize the flow rate control of the network slicing, and reduce the overload operation of the network slicing
  • the danger of slicing is conducive to improving the security and stability of network slicing.
  • an embodiment of the present application provides a flow control method applied to a policy control network element, including: obtaining an actual flow rate of a target network area in a target network slice, where the actual flow rate is used to indicate that the network slice is in The sum of the traffic rates occupied by all the sessions that have been accessed in the target network area; determine the authorized traffic rate of the first session according to the upper limit traffic rate of the target network area and the actual traffic rate, the authorized traffic rate It is used to indicate the maximum flow rate allowed by the first session; and send the authorized flow rate to the control network element of the first session.
  • this solution obtains the actual traffic rate of the target network area and combines the upper limit traffic rate to realize the determination of the authorized traffic rate of the first session, so that the control network element can compare the first session based on the authorized traffic rate of the first session.
  • Each type of service realizes traffic control separately, and also controls the traffic usage of the entire target network area as a whole, which can reduce the risk of network slicing overload operation and help improve the security and stability of network slicing.
  • the method before the determining the authorized traffic rate of the first session, the method further includes: receiving a first message, the first message being used to request the establishment of the first session Or used to request to modify the first session.
  • the first session includes a guaranteed bit rate service, and/or a non-guaranteed bit rate service.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the determining the authorized flow rate of the first session includes: when the actual flow rate is less than the upper limit flow rate, maximizing the subscription of the first session The flow rate is determined as the authorized flow rate; or, when the actual flow rate is less than or equal to the first flow rate, the maximum contract flow rate of the first session is determined as the authorized flow rate, wherein The first flow rate is less than the message upper limit flow rate; or, when the actual flow rate is less than the first flow rate, the maximum contract flow rate of the first session is determined as the authorized flow rate; or, when all When the ratio between the actual flow rate and the upper limit flow rate is less than or equal to the preset first threshold, the maximum contract flow rate of the first session is determined as the authorized flow rate, wherein the first The threshold is less than 1; or, when the ratio between the actual flow rate and the upper limit flow rate is less than the first threshold, the maximum contract flow rate of the first session is determined as the authorized flow rate.
  • the determining the authorized flow rate of the first session includes: when the actual flow rate is less than the upper limit flow rate, according to the maximum subscription of the first session Flow rate, determine the authorized flow rate; wherein, the authorized flow rate is less than the contracted maximum flow rate; or, when the actual flow rate is greater than the first flow rate and less than the upper limit flow rate, according to the The contracted maximum flow rate of the first session determines the authorized flow rate; wherein, the authorized flow rate is less than the contracted maximum flow rate, and the first flow rate is less than the upper limit flow rate; or, when the When the actual traffic rate is greater than or equal to the first traffic rate and less than the upper limit traffic rate, the authorized traffic rate is determined according to the contracted maximum traffic rate of the first session; wherein, the authorized traffic rate is less than the maximum traffic rate.
  • the contracted maximum flow rate or, when the ratio between the actual flow rate and the upper limit flow rate is greater than a preset first threshold, and the ratio is less than 1, according to the contracted maximum flow rate of the first session Rate, determine the authorized flow rate; wherein, the authorized flow rate is less than the contracted maximum flow rate; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset first Threshold, and the ratio is less than 1, the authorized flow rate is determined according to the contracted maximum flow rate of the first session; wherein the authorized flow rate is less than the contracted maximum flow rate.
  • the determining the authorized traffic rate of the first session includes: when the actual traffic rate is greater than or equal to the upper limit traffic rate, setting the traffic rate of the first session The minimum contracted traffic rate is determined as the authorized traffic rate, or the minimum value of the maximum bit rate of the set of contracted terminals of the target network slice is determined as the maximum bit rate of the set of authorized terminals.
  • the method further includes: receiving a second subscribed traffic rate from an application function network element, where the second subscribed traffic rate is used to limit the first application related The minimum traffic rate and/or maximum traffic rate of the first session in the target network area, the second subscription traffic rate indicates the minimum traffic rate required by the first session related to the first application to ensure service quality, and/or The maximum traffic rate that the service may generate; the second contracted traffic rate is determined according to the first contracted traffic rate and the actual traffic rate.
  • the method when the actual traffic rate is greater than or equal to the upper limit traffic rate, the method further includes one or more of the following: refusing to allocate for the first session The authorized traffic rate; in the target network area, release the service quality data stream of the non-guaranteed bit rate service; release the low-priority session in the target network area; modify the service quality parameter of the first session,
  • the service quality parameters include one or more of priority, preemption ability, and willingness to be preempted.
  • the method further includes: sending the authorized traffic rate to the control network element of the second session; wherein, the service of the second session is the same as that of the first session. And/or the application to which the second session belongs is the same as the application to which the first session belongs.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network area.
  • the acquiring the actual traffic rate of the target network area in the target network slice includes: receiving a second message from a data analysis network element, the second message carrying all The actual traffic rate and the upper limit traffic rate of the target network area; or, receiving a third message from a data storage network element, the third message carrying the actual traffic rate and the upper limit of the target network area The upper limit traffic rate; or, when the target network area is the entire coverage area of the target network slice, receiving a fourth message from each policy control network element in the entire coverage area of the target network slice, the The fourth message carries the actual traffic rate of the policy control network element in its own service area; and summarizes the actual traffic rate in each service area to obtain the actual traffic rate of the target network area; or, when the target When the network area is a local area in the target network slice, receive a fifth message from each access and mobility management network element in the local area in the target network slice, where the fifth message carries the access The actual traffic bandwidth of each access network device in the target network slice of the access and mobility
  • the sending the authorized traffic rate to the control network element of the first session includes: sending the session management network element corresponding to the first session The maximum bit rate of the authorized session set for the non-guaranteed bit rate service in the first session, and the authorized maximum bit rate of the guaranteed bit rate service in the first session; sending the first session to the terminal corresponding to the first session The maximum bit rate of the authorized session set for non-guaranteed bit rate services in a session.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • the present application provides a flow control method, which is executed on a control network element, and includes: receiving an authorized flow rate from a policy control network element; wherein, the authorized flow rate is used to indicate the maximum allowed flow rate for the first session Traffic rate, the authorized traffic rate is determined based on the actual traffic rate and the upper limit traffic rate of the target network area in the target network slice; the actual traffic rate is used to indicate that the network slice has been accessed in the target network area The sum of traffic rates occupied by all sessions of, and perform traffic control on the first session based on the authorized traffic rate.
  • the control network element controls the flow of each type of service in the first session according to the authorized flow rate determined by the control network element according to the policy, which helps reduce the risk of network slicing overload and improves the security of network slicing And stability.
  • the first session includes a guaranteed bit rate service, and/or a non-guaranteed bit rate service.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the authorized flow rate is the first The maximum subscribed flow rate of a session.
  • the first flow rate is less than the upper limit flow rate; or, when the actual flow rate is greater than or equal to the first flow rate and less than the upper limit flow rate; or, when the actual flow rate is equal to
  • the ratio between the upper limit flow rate is greater than the preset first threshold and the ratio is less than 1; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset first threshold
  • the authorized traffic rate is determined according to the contracted maximum traffic rate of the first session; wherein the authorized traffic rate is less than the contracted maximum traffic rate.
  • the authorized traffic rate is: the contracted minimum traffic rate of the first session or the The minimum value of the maximum bit rate of the subscription terminal set of the target network slice.
  • the second subscription traffic rate is used to limit the minimum traffic rate and/or the maximum traffic rate of the first session related to the first application in the target network area.
  • the subscription flow rate indicates the minimum flow rate required for the first session related to the first application to ensure service quality, and/or the maximum flow rate that the service may generate; the second subscription flow rate comes from an application function network element,
  • the second subscription traffic rate is determined according to the first subscription traffic rate and the actual traffic rate.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • control network element is a session management network element
  • the performing flow control on the first session based on the authorized flow rate includes: controlling a user plane network Element allocates a quality service flow to the first session; determines the maximum flow rate of the first session based on the maximum flow rate of the allocated quality service flow of the first session; when the maximum flow rate of the first session When the rate is greater than the authorized flow rate, the maximum flow rate of the newly allocated quality service flow is modified, and/or the maximum flow rate of the currently allocated quality service flow of the first session is modified.
  • the first session includes a guaranteed bit rate quality service flow, and/or a non-guaranteed bit rate quality service flow; and the The flow control of the first session includes one or more of the following: modifying the maximum flow rate of the newly allocated guaranteed bit rate quality service flow; modifying the maximum flow rate of the currently allocated guaranteed bit rate quality service flow of the first session Flow rate; modify the maximum flow rate of the non-guaranteed bit rate quality service flow of the first session.
  • control network element is a terminal corresponding to the first session
  • performing flow control on the first session based on the authorized flow rate includes: Based on the authorized flow rate, flow control is performed on the uplink flow rate of the first session.
  • this application provides a flow control method applied to an application function network element, including: obtaining the actual flow rate of the target network area in the target network slice, and the actual flow rate is used to indicate that the network slice is in all areas.
  • the sum of the traffic rate occupied by all the sessions that have been accessed in the target network area; the second application information parameter is determined according to the upper limit traffic rate of the target network area and the actual traffic rate; the second application information parameter is used To describe the bandwidth requirement and service priority of the first application that provides the service; send the adjusted application information parameters to the policy control network element.
  • the application function network element can determine the bandwidth requirement and service priority of the first application based on the actual traffic rate and the upper limit traffic rate of the target network area, so that the network side network element can also realize the target network area based on this.
  • the determination of the contracted flow rate or the authorized flow rate can also achieve flow control over the target network area.
  • the second application information parameters include: bandwidth requirement parameters of the application session, bandwidth requirement parameters of the application service flow, service priority, and preemption order parameters under the same priority One or more of; wherein the bandwidth requirement parameter of the application service flow includes: a second subscription flow rate, and the second subscription flow rate is used to limit the first session related to the first application in the The minimum traffic rate and/or the maximum traffic rate of the target network area, and the second subscription traffic rate indicates the minimum traffic rate required by the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate .
  • the determining the second application information parameter according to the upper limit traffic rate of the target network area and the actual traffic rate includes: when the actual traffic rate is compared with the actual traffic rate. When the ratio between the upper limit flow rates is greater than or equal to a preset threshold, the first application information parameter is adjusted to obtain the second application information parameter.
  • the adjusting the first application information parameter includes one or more of the following: reducing the bandwidth demand parameter of the application session; reducing the bandwidth demand parameter of the application service flow; Reduce the business priority of the application;
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • the acquiring the actual traffic rate of the target network area in the target network slice includes: sending a sixth message to the policy control network element; receiving from the policy control network element The seventh message of, the seventh message carries the actual traffic rate.
  • the sixth message is used to request the policy control network element to feed back the actual traffic rate of the target network area, or the sixth message is used to Request the policy control network element to periodically feed back the actual traffic rate of the target network area, or the sixth message is used to request the policy control network element to feed back the target network area when a preset condition is met The actual flow rate.
  • the seventh message further carries the upper limit flow rate.
  • this application provides a network device, including: a processing module and a transceiver module; wherein the transceiver module is configured to obtain the actual traffic rate of the target network area in the target network slice, and the actual traffic rate is used for Indicates the sum of traffic rates occupied by all sessions that the network slice has accessed in the target network area; the processing module is configured to determine according to the upper limit traffic rate of the target network area and the actual traffic rate The authorized flow rate of the first session, where the authorized flow rate is used to indicate the maximum flow rate allowed by the first session; the transceiver module is also used to send the authorized flow to the control network element of the first session rate.
  • this solution obtains the actual traffic rate of the target network area and combines the upper limit traffic rate to realize the determination of the authorized traffic rate of the first session, so that the control network element can compare the first session based on the authorized traffic rate of the first session.
  • Each type of service realizes traffic control separately, and also controls the traffic usage of the entire target network area as a whole, which can reduce the risk of network slicing overload operation and help improve the security and stability of network slicing.
  • the processing module is further configured to: receive a first message, the first message being used to request to establish the first session or to request to modify the first session .
  • the first session includes a guaranteed bit rate service, and/or a non-guaranteed bit rate service.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the processing module is specifically configured to: when the actual flow rate is less than the upper limit flow rate, determine the contracted maximum flow rate of the first session as The authorized traffic rate; or, when the actual traffic rate is less than or equal to the first traffic rate, the maximum contracted traffic rate of the first session is determined as the authorized traffic rate, wherein the first traffic rate Is less than the message upper limit flow rate; or, when the actual flow rate is less than the first flow rate, the maximum contracted flow rate of the first session is determined as the authorized flow rate; or, when the actual flow rate When the ratio to the upper limit flow rate is less than or equal to the preset first threshold, determining the contracted maximum flow rate of the first session as the authorized flow rate, where the first threshold is less than 1; Alternatively, when the ratio between the actual flow rate and the upper limit flow rate is less than the first threshold, the maximum contract flow rate of the first session is determined as the authorized flow rate.
  • the processing module is specifically configured to: when the actual traffic rate is less than the upper limit traffic rate, determine according to the contracted maximum traffic rate of the first session The authorized flow rate; wherein the authorized flow rate is less than the contracted maximum flow rate; or, when the actual flow rate is greater than the first flow rate and less than the upper limit flow rate, according to the first session To determine the authorized flow rate; wherein, the authorized flow rate is less than the contracted maximum flow rate, and the first flow rate is less than the upper limit flow rate; or, when the actual flow rate is greater than Or equal to the first traffic rate and less than the upper limit traffic rate, determine the authorized traffic rate according to the contracted maximum traffic rate of the first session; wherein the authorized traffic rate is less than the contracted maximum traffic rate Rate; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than a preset first threshold, and the ratio is less than 1, the maximum flow rate of the contract for the first session is determined.
  • the authorized flow rate wherein, the authorized flow rate is less than the contracted maximum flow rate; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset first threshold, and When the ratio is less than 1, the authorized flow rate is determined according to the contracted maximum flow rate of the first session; wherein the authorized flow rate is less than the contracted maximum flow rate.
  • the processing module is specifically configured to: when the actual traffic rate is greater than or equal to the upper limit traffic rate, set the contracted minimum traffic rate of the first session , Determine it as the authorized traffic rate, or determine the minimum value of the maximum bit rate of the set of contracted terminals of the target network slice as the maximum bit rate of the set of authorized terminals.
  • the transceiver module is further configured to: receive a second contracted traffic rate from an application function network element, where the second contracted traffic rate is used to limit the first contracted traffic rate.
  • the minimum traffic rate and/or maximum traffic rate of an application-related first session in the target network area, and the second subscription traffic rate indicates the minimum traffic rate required by the first application-related first session to ensure service quality, And/or the maximum traffic rate that the service may generate; the second contracted traffic rate is determined according to the first contracted traffic rate and the actual traffic rate.
  • the processing module when the actual flow rate is greater than or equal to the upper limit flow rate, is further used for one or more of the following: reject as the first One session allocates the authorized traffic rate; in the target network area, releases service quality data streams of non-guaranteed bit rate services; releases low-priority sessions in the target network area; modifies the services of the first session Quality parameters, where the service quality parameters include one or more of priority, preemption capability, and willingness to be preempted.
  • the transceiver module is further configured to: send the authorized traffic rate to the control network element of the second session; wherein, the service of the second session is the same as that of the The services of the first session are the same, and/or the application to which the second session belongs is the same as the application to which the first session belongs.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network area.
  • the transceiver module is specifically configured to: receive a second message from a data analysis network element, where the second message carries the actual information of the target network area. Flow rate and the upper limit flow rate; or, receive a third message from a data storage network element, the third message carrying the actual flow rate and the upper limit flow rate of the target network area; or, when When the target network area is the entire coverage area of the target network slice, receive a fourth message from each policy control network element in the entire coverage area of the target network slice, where the fourth message carries the policy control
  • the actual traffic rate of the network element in its own service area; the actual traffic rate in each service area is summarized to obtain the actual traffic rate of the target network area; or, when the target network area is the target network slice In the local area in the target network slice, a fifth message from each access and mobility management network element in the local area in the target network slice is received, and the fifth message carries the access and mobility management network element in its own In the service area, the actual traffic bandwidth of each access network
  • the transceiver module is specifically configured to: send the authorization for the non-guaranteed bit rate service in the first session to the session management network element corresponding to the first session The maximum bit rate of the session set, and the authorized maximum bit rate of the guaranteed bit rate service in the first session; sending the authorized session of the non-guaranteed bit rate service in the first session to the terminal corresponding to the first session The maximum bit rate of the aggregate.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • this application provides a network device, including: a transceiver module and a processing module; wherein the receiving module is configured to receive an authorized traffic rate from a policy control network element; wherein the authorized traffic rate is used In order to indicate the maximum flow rate allowed for the first session, the authorized flow rate is determined based on the actual flow rate and the upper limit flow rate of the target network area in the target network slice; the actual flow rate is used to indicate that the network slice is in all areas. The sum of traffic rates occupied by all the sessions that have been accessed in the target network area; the processing module is configured to perform traffic control on the first session based on the authorized traffic rate. In this way, the control network element controls the flow of each type of service in the first session according to the authorized flow rate determined by the control network element according to the policy, which helps reduce the risk of network slicing overload and improves the security of network slicing And stability.
  • the first session includes a guaranteed bit rate service, and/or a non-guaranteed bit rate service.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the authorized flow rate is the first The maximum subscribed flow rate of a session.
  • the first flow rate is less than the upper limit flow rate; or, when the actual flow rate is greater than or equal to the first flow rate and less than the upper limit flow rate; or, when the actual flow rate is equal to
  • the ratio between the upper limit flow rate is greater than the preset first threshold and the ratio is less than 1; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset first threshold
  • the authorized traffic rate is determined according to the contracted maximum traffic rate of the first session; wherein the authorized traffic rate is less than the contracted maximum traffic rate.
  • the second subscription traffic rate is used to limit the minimum traffic rate and/or the maximum traffic rate of the first session related to the first application in the target network area.
  • the subscription flow rate indicates the minimum flow rate required for the first session related to the first application to ensure service quality, and/or the maximum flow rate that the service may generate; the second subscription flow rate comes from an application function network element,
  • the second subscription flow rate is determined according to the first subscription flow rate and the actual flow rate, and the first subscription flow rate comes from a data management network element or a data storage network element.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • the processing module is specifically configured to: control the user plane network element to allocate a quality service flow for the first session; based on the allocated quality of the first session
  • the maximum flow rate of the service flow determines the maximum flow rate of the first session; when the maximum flow rate of the first session is greater than the authorized flow rate, the maximum flow rate of the newly allocated quality service flow is modified, and/ Or, modify the maximum flow rate of the currently allocated quality service flow of the first session.
  • the first session includes a guaranteed bit rate quality service flow, and/or a non-guaranteed bit rate quality service flow; the processing module is specifically used for the following Or multiple types: modify the maximum flow rate of the newly allocated guaranteed bit rate quality service flow; modify the maximum flow rate of the currently allocated guaranteed bit rate quality service flow of the first session; modify the non-guaranteed bit rate of the first session The maximum flow rate of a quality service flow.
  • control network element is a terminal corresponding to the first session, and the processing module is specifically configured to: The upstream flow rate of the session is flow controlled.
  • the present application provides a network device, including: a processing module and a transceiver module; wherein, the processing module is used to obtain the actual traffic rate of the target network area in the target network slice, and the actual traffic rate is used for Indicating the sum of traffic rates occupied by all sessions that the network slice has accessed in the target network area; the processing module is further configured to, based on the upper limit traffic rate of the target network area and the actual traffic rate, Determine the second application information parameter; the second application information parameter is used to describe the bandwidth requirement and service priority of the first application that provides the service; the transceiver module is used to send the adjusted application to the policy control network element Information parameters.
  • the application function network element can determine the bandwidth requirement and service priority of the first application based on the actual traffic rate and the upper limit traffic rate of the target network area, so that the network side network element can also realize the target network area based on this.
  • the determination of the contracted flow rate or the authorized flow rate can also achieve flow control over the target network area.
  • the second application information parameters include: bandwidth requirement parameters of the application session, bandwidth requirement parameters of the application service flow, service priority, and preemption order parameters under the same priority One or more of; wherein the bandwidth requirement parameter of the application service flow includes: a second subscription flow rate, and the second subscription flow rate is used to limit the first session related to the first application in the The minimum traffic rate and/or the maximum traffic rate of the target network area, and the second subscription traffic rate indicates the minimum traffic rate required by the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate .
  • the processing module is specifically configured to: when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to a preset threshold, An application information parameter is adjusted to obtain the second application information parameter.
  • the processing module is specifically used for one or more of the following: reducing bandwidth demand parameters of application sessions; reducing bandwidth demand parameters of application service flows; reducing application services Priority; adjust the preemption sequence of multiple application services at the same priority; modify the willingness to be preempted for some application sessions.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the one requested by the first session to access Network slicing.
  • the actual traffic rate is determined according to the actual traffic of the N6 interface in the target network area.
  • the actual traffic rate is determined according to the performance statistics data of the average bandwidth used by the terminals in the target network area and the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • it is specifically configured to: send a sixth message to the policy control network element; receive a seventh message from the policy control network element, where the seventh message carries the Actual flow rate.
  • the sixth message is used to request the policy control network element to feed back the actual traffic rate of the target network area, or the sixth message is used to Request the policy control network element to periodically feed back the actual traffic rate of the target network area, or the sixth message is used to request the policy control network element to feed back the target network area when a preset condition is met The actual flow rate.
  • the seventh message further carries the upper limit flow rate.
  • the present application provides a network device, including: at least one processor and a memory; the memory stores computer-executable instructions; the at least one processor executes the computer-executable instructions stored in the memory, so that the at least one A processor executes the method described in any one of the embodiments of the first aspect, the second aspect, or the third aspect.
  • this application provides a computer-readable storage medium in which a computer program is stored, and when it runs on a computer, the computer can execute the first, second, or third aspect The method described in any of the embodiments.
  • this application provides a computer program, when the computer program is executed by a computer, it is used to execute the method described in any one of the embodiments of the first aspect, the second aspect, or the third aspect.
  • the program in the ninth aspect may be stored in whole or in part on a storage medium packaged with the processor, or may be stored in part or in a memory not packaged with the processor.
  • an embodiment of the present application further provides a communication system, including: a policy control network element configured to execute the method according to any one of the embodiments of the first aspect; and a control network element configured to execute the second aspect The method described in any one of the embodiments of the aspect.
  • the communication system further includes: an application function network element configured to execute the method according to any one of the embodiments of the third aspect.
  • control network element is a session management network element; or, the control network element is the session management network element or a terminal corresponding to the first session.
  • the embodiments of the present application provide a flow control method, network device, and communication system, which can control the authorized flow rate of the first session based on the actual flow rate and the upper limit flow rate of the target network area in the network slicing, and avoid After joining the first session, the traffic in the target network area exceeds its maximum allowable flow rate, ensuring the security and stability of the target network area.
  • FIG. 1 is a schematic diagram of a communication system provided by an embodiment of this application.
  • FIG. 2 is a schematic diagram of the architecture of a communication system provided by an embodiment of this application.
  • FIG. 3 is a schematic flowchart of a flow rate control method in the prior art
  • FIG. 5 is a schematic flowchart of another flow control method provided by an embodiment of this application.
  • FIG. 7 is a schematic diagram of information exchange of another flow control method provided by an embodiment of this application.
  • FIG. 8 is a schematic diagram of information exchange of another flow control method provided by an embodiment of this application.
  • FIG. 9 is a schematic diagram of the physical structure of a network device provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of another network device provided by an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of another network device provided by an embodiment of this application.
  • FIG. 1 shows three network slices.
  • network slice 1 ⁇ network slice 3.
  • network slices are obtained by a logical division, and there may be overlapping regions among multiple network slices. For example, there may be overlapping regions among the three network slices in FIG. 1.
  • any network slice in Figure 1 it constitutes an end-to-end logical network, and the logic between different network slices is isolated from each other.
  • Each network slice can provide one or more network services for the terminal, and the network services provided between different network slices do not interfere and affect each other.
  • the network characteristics and performance requirements of different network slices are not the same.
  • enhanced mobile broadband eMBB
  • ultra-reliable and low-latency communication URLLC
  • massive Internet of Things URLLC
  • MIoT massive Internet of Things
  • FIG. 2 shows a schematic diagram of the architecture of the communication system. Schematically, FIG. 2 only shows one network slice 1.
  • the communication system includes: a terminal (or called a terminal device), an access network (access network, AN) device, an access management network element, a session management network element, a user plane network element, Policy control network elements, network slicing selection network elements, network warehouse function network elements, network data analysis network elements, unified data management network elements, unified data storage network elements, data network (DN) network elements connected to operator networks .
  • a terminal or called a terminal device
  • an access network access network
  • AN access management network element
  • session management network element a session management network element
  • a user plane network element Policy control network elements
  • network slicing selection network elements network warehouse function network elements
  • network data analysis network elements unified data management network elements
  • unified data storage network elements unified data storage network elements
  • DN data network
  • network slice selection network elements are shared among multiple network slices.
  • network warehouse function network elements generally belong to specific network slices.
  • network data analysis network elements generally analyze data
  • unified data management network elements unified data storage network elements
  • access management network elements are shared among multiple network slices.
  • Session management network elements and user plane network elements generally belong to specific network slices.
  • the policy control network element can be shared among multiple network slices, or can also belong to a specific network slice.
  • Access network equipment is generally shared among multiple network slices.
  • the dotted line is used to identify the user plane connection between network elements (or devices), and the solid line is used to identify the control plane connection between network elements (or devices).
  • Terminal It can also be called user equipment (UE), mobile station and remote station, etc. It is a network device with wireless transceiver function.
  • the terminal can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted ; It can also be deployed on the water surface (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons, and satellites, etc.).
  • the terminal may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with wireless transceiver function, virtual reality (VR) terminal equipment, augmented reality (AR) terminal equipment, Wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety Wireless terminals in ), wireless terminals in a smart city, and wireless terminals in a smart home (smart home) are not exhaustively listed.
  • the embodiments of the present application do not limit the specific technology, device form, and name adopted by the terminal.
  • Access network equipment used for the wireless side access of the terminal to provide access services for the terminal to access the wireless network. Possible deployment forms of access network equipment include: centralized unit (CU) and distributed unit
  • DU Distributed unit
  • the CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (packet data convergence protocol, PDCP), service data adaptation protocol (service data adaptation protocol, SDAP) and other protocols;
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • SDAP service data adaptation protocol
  • DU It mainly supports radio link control (RLC), media access control (MAC) and physical layer protocols.
  • a single site can include a radio base station (new radio Node, gNB), an evolved Node B (evolved Node B, eNB), a radio network controller (RNC), and a Node B (Node B, One or more of NB), base station controller (BSC), base transceiver station (BTS), home base station, and baseband unit (BBU).
  • gNB new radio Node
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • BBU baseband unit
  • gNB-A and gNB-B two access network devices are specifically shown: gNB-A and gNB-B.
  • gNB-A there may be one or more gNBs (usually multiple) in the entire service area of a network slice.
  • Each gNB has a certain coverage area.
  • Cell Within its coverage area, there may be one or more cells (Cell), and each cell has a unique global cell identifier (GCI).
  • GCI global cell identifier
  • Access management network element It is mainly used for terminal attachment, mobility management, and tracking area update procedures in the mobile network.
  • the access management network element terminates non-access stratum (NAS) messages, completes registration management, Connection management and reachability management, allocation of tracking area list (track area list, TA list), mobility management, etc., and transparent routing of session management (session management, SM) messages to the session management network element.
  • NAS non-access stratum
  • Session management network element Mainly used for session management in mobile networks, such as session establishment, modification, and release. Specific functions include assigning an Internet Protocol (IP) address to the terminal, selecting a user plane network element that provides a message forwarding function, and so on.
  • IP Internet Protocol
  • the session management network element may be a session management function (session management function, SMF).
  • SMF session management function
  • SMF is used to directly refer to the session management network element.
  • User plane network element It can also be called protocol data unit (PDU) and session anchor (PDU session anchor, PSA). It is mainly responsible for processing user messages, such as forwarding, charging, and legal monitoring.
  • PDU protocol data unit
  • PSA session anchor
  • UPF user plane function
  • the UPF is used to directly refer to the user plane network element.
  • Policy control network elements including user subscription data management functions, policy control functions, charging policy control functions, quality of service (quality of service, QoS) control, etc.
  • the policy control network element may be a policy control function (PCF).
  • PCF policy control function
  • PCF is used to directly refer to the policy control network element.
  • the PCF can also be divided into multiple entities according to levels or functions.
  • it may include: a global PCF and multiple intra-slice PCFs, and each intra-slice PCF is used to implement the policy control function in the network slice to which it belongs.
  • the PCF may also be composed of a session management PCF (session management PCF, SM-PCF) and an access management PCF (access management PCF, AM-PCF).
  • the PCF includes two entities.
  • Network slicing selection network element Mainly used to select the appropriate network slicing for the terminal's business.
  • the network slice selection network element may be a network slice selection function (network slice selection function, NSSF) network element.
  • NSSF network slice selection function
  • the NSSF is used to directly refer to the network slicing selection network element.
  • Data network network element used to provide data transmission services for the terminal.
  • the DN can be a network element of a public data network (PDN) network, such as the Internet, etc., or a network element of a local access data network (LADN), such as Mobile edge computing (mobile edge computing, MEC) node network, etc.
  • PDN public data network
  • LADN local access data network
  • MEC Mobile edge computing
  • Unified data management network element used to manage the contract information of the terminal.
  • the unified data management network element may be unified data management (UDM).
  • UDM unified data management
  • data management network element simply referred to as: data management network element
  • Unified data storage network element used to store structured data information, including contract information, policy information, and network data or business data defined in a standard format.
  • the unified data storage network element may be a unified data repository (UDR).
  • UDR unified data repository
  • the UDR is directly used to refer to the unified data storage network element (or simply referred to as: data storage network element).
  • UDM and UDR can be implemented by the same network entity, that is, they can be the same network entity.
  • Network warehouse function network element In a 5G communication system, the network warehouse function network element may be a network repository function (NRF).
  • NRF network repository function
  • a network slice can be selected for the service based on the network slice identifier carried in the terminal service request, and the selected network slice can be used to transmit service data.
  • the identifier of the network slice may include, but is not limited to: network slice selection assistance information (NSSAI).
  • NSSAI network slice selection assistance information
  • S-NSSAI single network slice selection assistance information
  • NSSAI can be used to identify a single network slice
  • a network slice group may include one or more network slices.
  • SLA service level agreement
  • SLS service level specification
  • the maximum traffic rate of the network slice can be used to characterize the scale of the network slice.
  • the maximum traffic rate of a network slice is the sum of the maximum traffic rates allowed for all services transmitted through the network slice, that is, the traffic used by all PDU sessions (packet data unit sessions) connected to this network slice. The maximum sum of network speeds.
  • the maximum traffic rate of network slicing generally also distinguishes two directions, uplink (UL) and downlink (DL). Among them, UL refers to the transmission direction from the terminal side to the network side, and DL refers to the transmission direction from the network side to the terminal side.
  • UE-aggregate maximum bit rate UE-AMBR
  • the UE-AMBR is used to limit the sum of traffic rates that can be used by all non-guaranteed bit rate (non-guaranteed bit rate, non-GBR) services of certain terminals.
  • non-guaranteed bit rate non-guaranteed bit rate
  • the radio access network also performs rate management and control on the terminal in the uplink and/or downlink direction based on the UE-AMBR.
  • the terminal can have multiple types of services. According to the traffic rate requirements of different services, terminal services can be divided into two types: non-GBR type services and guaranteed bit rate (GBR) type services.
  • non-GBR type services and guaranteed bit rate (GBR) type services.
  • GRR guaranteed bit rate
  • GBR-type services have the lowest guarantee requirements for the flow rate.
  • GBR-type services have the minimum flow rate requirements, that is, GBR (to be distinguished from service types, hereinafter referred to as GBR value).
  • non-GBR type business has no minimum guarantee requirement, in other words, there is no minimum traffic rate requirement.
  • a video session service has a minimum requirement for a traffic rate, and a video session cannot be realized if the minimum requirement is lower.
  • the video session service is a GBR type service, and the minimum requirement for a traffic rate is the GBR value of the video session service; While the system notification service does not have a minimum requirement for the traffic rate, the system notification service is a non-GBR type service.
  • the GBR value of different GBR types of services can be different.
  • video session services and information session services are both GBR-type services.
  • the GBR value of the video session services is different from the GBR value of the information session services.
  • the network can control the data flow of GBR-type services to pass through when the actual bit rate does not exceed the GBR value by reserving resources and other methods.
  • the actual bit rate exceeds the GBR value
  • the network resources are insufficient (or called network congestion)
  • the data stream exceeding the GBR value will be discarded; if the network resources are sufficient (or called: the network is not congested), Then, data streams less than or equal to the maximum bit rate (MBR) can also pass.
  • MBR maximum bit rate
  • the AMF When receiving the registration request of the terminal, the AMF requests the UDM to obtain the subscription data of the terminal.
  • the terminal can be registered to one or more network slices, and the AMF can be shared among multiple network slices. Therefore, the registration request received by the AMF may be a request for the terminal to register to one or more network slices.
  • the registration request carries the identification information of the terminal.
  • the AMF can request the UDM to obtain the subscription data of the terminal based on the identification information of the terminal.
  • the subscription data of the terminal can be stored in the UDR, and the UDM can extract the data from the UDR, which will not be repeated.
  • the subscription data may include, but is not limited to: identification information (S-NSSAI or NSSAI) of all network slices subscribed by the terminal, and the contracted UE-AMBR corresponding to each S-NSSAI. It can be understood that the subscription UE-AMBR corresponding to an S-NSSAI is used to limit the sum of the traffic rates that the terminal can use for all non-GBR services in the network slice indicated by the S-NSSAI.
  • S-NSSAI identification information
  • NSSAI NSSAI
  • S304 The UDM sends the subscription data of the terminal to the AMF.
  • UDM can extract the subscription data of the terminal from the UDR based on the identification information of the terminal and send it to the AMF.
  • Figure 3 does not show this part of the process in detail.
  • the AMF requests the PCF to create access management policy control information, which carries the contracted UE-AMBR.
  • the PCF creates an access management policy control, and sends a response message to the AMF, which carries the authorized UE-AMBR.
  • the authorized UE-AMBR is generally determined based on the contracted UE-AMBR.
  • the authorized UE-AMBR is generally less than or equal to the subscribed UE-AMBR.
  • the authorized UE-AMBR generally has a one-to-one correspondence with the contracted UE-AMBR.
  • each S-NSSAI corresponding network slice
  • the AMF sends the authorized UE-AMBR to the RAN.
  • the AMF may carry the authorized UE-AMBR in the message sent to the RAN to send the UE-AMBR to the RAN.
  • the AMF may carry the authorized UE-AMBR in any one or more messages such as a session resource establishment request, an initial context establishment request, a UE context modification request, or a handover request.
  • the AMF may also separately send the authorized UE-AMBR to the RAN.
  • the RAN controls the total traffic rate of all non-GBR type services that access the network slice according to the authorized UE-AMBR.
  • the RAN can control the total traffic rate of all non-GBR services in the network slice so that the total traffic rate of all non-GBR services does not exceed the authorized UE-AMBR.
  • the aforementioned GBR value, MBR and UE-AMBR can all distinguish between uplink and downlink. It can be understood that when using these data to control the UL direction, the GBR value, MBR or UE-AMBR in the UL direction is used; if the DL direction is controlled, the GBR value, MBR or UE in the DL direction is used. -AMBR. This will not be repeated in the follow-up.
  • the GBR type service and the non-GBR type service are separately controlled.
  • the network side controls the flow rate used by GBR-type services not to exceed MBR through the GBR value and MBR of each business; for non-GBR-type services, the overall control is achieved through UE-AMBR.
  • the maximum traffic rate of a network slice actually limits the sum of traffic rates that can be used by all services (including GBR-type services and non-GBR-type services) connected to the network slice. Then, if the aforementioned flow control is performed for GBR type services and non-GBR type services separately, the flow rate control in the network slice will be unreasonable.
  • the actual flow rate of each GBR type service does not exceed the MBR, and the sum of the actual flow rates of all non-GBR type services does not exceed the authorized UE-AMBR.
  • the network side can control the number of terminals that access the network slice to initiate a PDU session according to the MBR of each terminal and the authorized UE-AMBR. Then, when a new terminal (terminals not connected to the network slice) has a non-GBR service request At the time of access, even if the actual traffic rate of the entire network slice has not reached the maximum traffic rate, resources will not be allocated for the new non-GBR type service, resulting in the new terminal and the non-GBR type service of the new terminal being restricted or wait. In other words, the existing sub-type flow control method will be restricted when the actual total rate used has not reached the maximum flow rate, and the network resource allocation is unreasonable.
  • the embodiments of the present application provide a flow control method, which can be implemented by the PCF on the network side.
  • PCF can be shared among multiple network slices, or it can belong to a specific network slice. Therefore, PCF can implement flow control on one or more network slices according to the following method.
  • a flow control scenario for a network slice is taken as an example to describe the implementation of the present application in detail.
  • the terminal can initiate a PDU session to the network slice as needed to realize communication.
  • the PCF on the network side can execute the flow control method based on the received PDU session request.
  • PCF can implement flow control on network slicing in the following manner, including the following steps:
  • S402 Obtain the actual traffic rate of the target network area in the target network slice, where the actual traffic rate is used to indicate the sum of traffic rates occupied by all sessions that the network slice has accessed in the target network area.
  • the target network slice may be one or more network slices managed by the PCF.
  • the target network area may be the entire coverage area or a partial coverage area of the target network slice.
  • PCF can be used to perform policy control on network slice 1 to network slice 3, and the target network slice can be one or more of network slice 1 to network slice 3.
  • the target network slice can be network slice 1
  • network slice 1 can cover 4 network areas
  • the target network area can be all of these 4 network areas (the entire network slice 1) or one or more of them.
  • A (not equal to 4) network area (part of the network area of network slice 1).
  • the target network area is specifically the entire coverage area or a partial area of the target network slice, which may be preset based on the actual scenario, which is not particularly limited in the embodiment of the present application.
  • S404 Determine the authorized flow rate of the first session according to the upper limit flow rate and the actual flow rate of the target network area, where the authorized flow rate is used to indicate the maximum flow rate allowed for the first session.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the total traffic rate of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate the total traffic rate of all guaranteed bit rate services included in the first session.
  • the upper limit of or the authorized flow rate is used to indicate the upper limit of the sum of the flow rates of all non-guaranteed bit rate services included in the first session.
  • the actual traffic rate is used to indicate the maximum traffic rate allowed in the target network area.
  • the upper limit flow rate of the target network area is the maximum flow rate of the target network slice, that is, the transmission of all PDU sessions connected to the target network slice The sum of the network speed used by the business.
  • the upper limit flow rate of the target network area is the network rate used by all PDU sessions that are connected to the target network area of the target network slice.
  • the local area of the network slice can be the tracking area TA (Tracking Area) or TA list, cell or cell list, etc., where the terminal is located; or, the area of the network slice can also be connected according to different data network DNs ( Data Network), the target of the PDU session is connected to different DNs, and will be divided into different network slice areas, that is, the DN area of the network slice.
  • a local area can also be called a partial area.
  • the first session is a PDU session initiated by the terminal to the target network slice.
  • the target network slice may include the network slice to which the first session requests access.
  • the target network slice is the network slice to which the first session requests access.
  • S406 Send the authorized flow rate to the control network element of the first session.
  • PCF is not used to undertake specific flow control functions.
  • the PCF sends the authorized flow rate to the control network element, so that the control network element performs flow control according to the authorized flow rate.
  • the control network element of the first session may include: the initiating terminal of the first session, SMF, etc. The processing of the control network element will be described later, which will not be repeated here.
  • the PCF obtains the sum of the traffic rates occupied by all the sessions that have been accessed in the target network area to obtain the actual traffic rate.
  • the actual traffic rate comprehensively considers the traffic rate occupied by GBR-type services and non-GBR-type services.
  • the PCF determines the authorized flow rate of the first session according to the actual flow rate and the upper limit flow rate, thereby achieving flow control on the target network area.
  • the number of UEs that access the network slice is controlled according to the authorized UE-AMBR and MBR respectively, so as to control the overall traffic of the network slice.
  • the embodiment shown in FIG. 4 controls The traffic rate of the target network area, thereby realizing the reasonable allocation of network resources in the target network area, and ensuring the security and stability of the target network area.
  • a new non-GBR service requests access to the target network area
  • the PCF will not allocate network resources for the new non-GBR type service, and the new non-GBR type service cannot successfully establish a session.
  • the PCF can allocate network resources for the PDU session of the new non-GBR service and determine its authorized flow rate. In this way, the new non-GBR Type services can successfully establish a session and access the target network area.
  • the flow control method shown in FIG. 4 can allocate network resources more reasonably.
  • S404 may be triggered by the PCF based on the received first message of the first session, where the first message is used to request the establishment of the first session, or to Request to modify the first session.
  • the first message may come from SMF, which will be described in detail later in conjunction with specific embodiments.
  • the first message may specifically be a session policy request (or may be referred to as: session management policy request, session policy request) message.
  • the session policy request message may be sent by the SMF based on the received eighth message.
  • the eighth message may be a context request message sent by the AMF to the SMF to request the creation of the first session, where the eighth message is sent by the AMF to the SMF in response to receiving the session establishment request.
  • the session establishment request can come from the terminal and is forwarded by the access network device to the AMF. It can be understood that a session establishment request (or referred to as: a session establishment request, a session request, a message for establishing a first session, etc., without special restrictions on the name) is used to request the establishment of the first session. For details, refer to FIG. 6 in the subsequent embodiment, and the description is not expanded here.
  • the eighth message may be a context request message sent by AMF to SMF to request modification of the first session, where the eighth message is sent by AMF to SMF in response to receiving the session modification request.
  • the session modification request can come from the terminal and be forwarded by the access network device to the AMF.
  • a session modification request (or called: a session modification request, a message used to modify the first session, etc., a service request, a session activation request, a user plane message used to activate the first session, etc., there is no special restriction on the name) Used to request modification of the first session.
  • the PCF may receive the first message, and trigger the execution of S404 in response to receiving the first message.
  • S402 is not restricted by the first message.
  • S402 may be performed before, at the same time, or after the PCF receives the first message of the first conversation.
  • the PCF may periodically execute S402, that is, the PCF may obtain the actual traffic rate of the target network area in the target network slice according to a preset timing moment or timing duration. In this way, when the PCF receives the first message of the first conversation, it is the last to obtain the actual traffic rate of the target network area acquired last time, which is beneficial to improve the efficiency of obtaining the actual traffic rate of the target network area, and thus is beneficial to reduce Waiting time on the terminal side.
  • the PCF may periodically perform S402, that is, the PCF periodically obtains the actual traffic rate of the target network area in the target network slice.
  • the PCF receives the first message of the first conversation, it first obtains the actual traffic rate of the target network area acquired in the most recent period, which is beneficial to improve the efficiency of obtaining the actual traffic rate of the target network area, and thus is beneficial to Reduce the waiting time on the terminal side.
  • the PCF may execute S402 when receiving the first message of the first conversation.
  • the actual traffic rate of the target network area obtained by the PCF is more accurate, which is conducive to the realization of accurate traffic control on the target network area.
  • PCF can perform S402 based on any one or more of the foregoing embodiments.
  • PCF can be shared between network slice 1 to network slice 3. Then the PCF can periodically (or periodically) obtain network slice 1 to network slice 3 and each of the network slices.
  • the actual flow rate in a local area PCF can be handled in the following ways:
  • the PCF when the PCF receives the first message of the first session, if the identifier of the network slice carried in the first message of the first session is S-NSSAI1, the network slice corresponding to S-NSSAI1 is network slice 1. Then the PCF can determine the target network area as the entire coverage area of the network slice 1 accordingly. As before, the PCF can periodically obtain the actual traffic rate of network slice 1 to network slice 3 and each local area in each network slice. At this point, when the PCF receives the first message of the first session, the PCF can determine the authorized traffic rate of the first session based on the actual traffic rate of network slice 1 acquired last time and the upper limit traffic rate of network slice 1 , And further, the PCF sends the authorized flow rate to the control network element of the first session. In this way, it is beneficial to improve the flow control efficiency on the network side and reduce the waiting time on the terminal side.
  • the PCF when the PCF receives the first message of the first session, if the network slice identifier carried in the first session establishment request or modification request is S-NSSAI1, and the identifier of the local area 1 of the network slice (for example, terminal The Tracking Area Identifier of the current tracking area, and another example is the data network name of the session connection (Data Network Name), where the network slice corresponding to S-NSSAI1 is network slice 1. Then the PCF can determine the target network area as the local area 1 in the network slice 1 accordingly. Therefore, the PCF can determine the authorized traffic rate of the first session based on the actual traffic rate of the local area 1 in the network slice 1 acquired last time and the upper limit traffic rate of the local area 1 of the network slice 1. The control network element of the first session sends the authorized flow rate.
  • S-NSSAI1 the network slice identifier carried in the first session establishment request or modification request
  • the identifier of the local area 1 of the network slice for example, terminal The Tracking Area Identifier of the current tracking area, and
  • the PCF obtains the actual traffic rate of the local area 1 in the network slice 1. In this way, the PCF actually implements the subsequent traffic rate control based on the local area of the target network slice.
  • the PCF when the PCF receives the first message of the first session, if the identifier of the network slice carried in the request for establishment or modification of the first session is S-NSSAI1, the network slice corresponding to S-NSSAI1 is the network slice 1, the PCF can determine the target network area as the entire coverage area of the network slice 1 accordingly.
  • the PCF has periodically obtained the data of each network slice and its local area managed by itself, after the PCF receives the first message of the first session, the PCF can also obtain the current time of the network slice 1. The actual traffic rate will be obtained later. Furthermore, based on the newly acquired actual traffic rate of network slice 1 and the upper limit traffic rate of network slice 1, the authorized traffic rate of the first session is determined, and then the PCF sends the authorized traffic rate to the control network element of the first session .
  • the PCF can either periodically obtain the actual traffic rate of each network area managed by itself, or obtain the actual traffic rate of the target network area in response to receiving the first message. It is helpful to improve the accuracy of the actual flow rate, and realize the precise flow control of the target network area.
  • the following describes how the PCF obtains the actual traffic rate of the target network area.
  • the actual traffic rate of the target network area can be acquired in any of the following ways:
  • the actual traffic rate of the target network area can be determined based on the actual traffic of the N6 interface in the target network area.
  • the N6 interface is the egress from the UPF to the DN or the local access DN in the network slice.
  • the actual traffic rate at each N6 interface in the target network area can be summarized to obtain the actual traffic rate of the target network area. That is, the sum of the actual traffic rate at each N6 interface in the target network area is obtained, and the actual traffic rate of the target network area is obtained.
  • the summary involved in the embodiment of this application refers to the data (data related to the actual traffic rate or bandwidth used) reported by all the lower-level network elements in the service area (for example, AMF can be used as the lower-level network element of the PCF). Sum, that is, to obtain the sum total of the data reported by each lower-level network element in the service area.
  • AMF can be used as the lower-level network element of the PCF.
  • the actual uplink traffic rate of the target network area can be determined based on the actual uplink traffic rate at the N6 interface. It is also possible to determine the actual downlink traffic rate of the target network area based on the actual downlink traffic rate at the N6 interface.
  • the actual upstream traffic rate of the five N6 interfaces can be summarized to obtain the actual upstream traffic rate of network slice 1.
  • the actual downstream traffic rate of the five N6 interfaces can be summarized to obtain the actual downstream traffic rate of network slice 1.
  • network slice 1 includes two local areas, where local area 1 includes N6 interface 1 to N6 interface 3, and local area 2 includes N6 interface 4 and N6 interface 5, then the N6 interface 1 to N6 interface 3
  • the actual upstream traffic rate is summarized to obtain the actual upstream traffic rate of local area 1, and the actual downstream traffic rates of N6 interface 1 to N6 interface 3 are summarized to obtain the actual downstream traffic rate of local area 1.
  • Connect N6 interface 4 and N6 interface The actual upstream traffic rate of 5 is summarized to obtain the actual upstream traffic rate of local area 2, and the actual downstream traffic rates of N6 interface 4 and N6 interface 5 are summarized to obtain the actual downstream traffic rate of local area 2.
  • the actual traffic rate of the target network area is determined according to the bandwidth usage of each terminal in the target network area.
  • the essence is to obtain the sum of the used bandwidth of all terminals in the target network area. That is, by obtaining the used bandwidth of each terminal in the target network area, and obtaining the sum of the used bandwidth of all terminals in the target network area, the actual traffic rate of the target network area can be obtained.
  • the used bandwidth of each terminal in the target network area is the same, and this is recorded as the average used bandwidth of the terminal. Therefore, it is only necessary to obtain the product of the average used bandwidth of the terminal and the number of terminals to determine the actual traffic rate of the target network area.
  • the number of terminals may be: the number of terminals that have currently accessed the target network area.
  • the actual uplink traffic rate of the target network area can be determined based on the product of the average uplink bandwidth used by the terminals currently accessing the target network area and the number of terminals (denoted as the first number); based on the downlink average of the terminals currently accessing the target network area Use the product of the bandwidth and the number of terminals (denoted as the second number) to determine the actual downlink traffic rate of the target network area.
  • the first number and the second number may be the same or different.
  • the actual traffic rate of the target network area is determined according to the actual traffic bandwidth of the access network devices in the target network area in the target network slice.
  • the terminal accesses the network slice through the access network equipment (AN).
  • the AN can record the traffic rate of accessing the network slice through itself, thereby specifically implementing S402
  • the actual traffic bandwidth of each AN in the target network area in the target network slice can be summarized (summation processing), so that the actual traffic rate of the target network area can be determined.
  • the actual traffic rate of the target network area may be executed by the PCF itself, or may also be determined by other network elements and sent to the PCF.
  • the actual traffic rate of the target network area may be determined by the data analysis network element NWDAF.
  • the PCF executes S402, it can receive a second message from NWDAF.
  • the second message carries the actual traffic rate of the target network area and optionally the upper limit traffic rate.
  • UPF or SMF can collect the actual uplink and/or downlink traffic rate of each N6 interface in the target network area. Then, UPF or SMF can send the collected actual N6 interface data to NWDAF. Traffic rate, NWDAF can summarize the actual traffic rate of each N6 interface to obtain the actual traffic rate of the target network area, and send a second message to the PCF.
  • the management plane network element OAM can obtain the average used bandwidth and the number of terminals of the terminals in the target network area reported by the RAN, and then the OAM sends the average used bandwidth and the number of terminals to the NWDAF , And the NWDAF obtains the product of the two to obtain the actual traffic rate of the target network slice, and sends a second message to the PCF. Or, after OAM obtains the average used bandwidth of the terminal and the number of terminals, it can obtain the product of the two to obtain the actual traffic rate of the target network slice. Then, OAM sends the actual traffic rate of the target network slice to NWDAF, and NWDAF can send it to PCF. Send the second message.
  • UPF or SMF can collect the actual uplink and/or downlink traffic rate of each N6 interface in the target network area, and then UPF or SMF can send the collection to the PCF in the service area to which it belongs. Then, each PCF sends the actual flow rate of the N6 interface to the NWDAF, and then, NWDAF can summarize the actual flow rate of each N6 interface to obtain the actual flow rate of the target network area, and send it to the receiver The PCF of the first message to the first conversation sends the second message.
  • each AN in the target network area can measure the uplink and/or downlink traffic bandwidth of the target network area (or target network slice), and each AN accesses the network slice through AMF.
  • each AMF can collect the bandwidth measurement results reported by each AN in its own service area, and then the AMF can send the collected bandwidth measurement results obtained by each AN to the PCF in its own service area, thus,
  • Each PCF sends the bandwidth measurement results obtained by each AN to the NWDAF, and the NWDAF summarizes the bandwidth measurement results to obtain the actual traffic rate of the target network area, and the NWDAF can send a second message to the PCF.
  • NWDAF can directly aggregate directly.
  • the aggregated data that is, the actual traffic rate of the AMF's own service area
  • the PCF serves itself
  • NWDAF the actual traffic rate in the PCF service area
  • the PCF can directly send the data reported by all AMFs in the PCF service area to NWDAF, so that NWDAF will summarize .
  • the AMF can directly send the collected bandwidth measurement results reported by each AN to the PCF. After that, the PCF aggregates the data reported by each AN in its service area and sends the aggregated data to the NWDAF.
  • the actual traffic rate of the target network area may be determined by the data storage network element UDR.
  • the PCF executes S402, it can receive a third message from the UDR, and the third message carries the actual traffic rate and the upper limit traffic rate of the target network area.
  • UPF or SMF can collect the actual uplink and/or downlink traffic rate of each N6 interface in the target network area, and then UPF or SMF can collect the actual traffic rate of the N6 interface.
  • the UDR can summarize the actual traffic rate of each N6 interface to obtain the actual traffic rate of the target network area, and send a third message to the PCF.
  • the management plane network element OAM can obtain the average used bandwidth and the number of terminals in the target network area reported by the RAN, and then the OAM sends the UDR the average used bandwidth and the number of terminals. , And the UDR obtains the product of the two to obtain the actual traffic rate of the target network slice, and sends a third message to the PCF. Or, after OAM obtains the average used bandwidth of the terminal and the number of terminals, it can obtain the product of the two to obtain the actual traffic rate of the target network slice. Then, OAM sends the actual traffic rate of the target network slice to NWDAF, and NWDAF can send it to PCF. Send the third message.
  • UPF or SMF can collect the actual uplink and/or downlink traffic rate of each N6 interface in the target network area, and then UPF or SMF can collect the actual traffic of the N6 interface.
  • the rate is sent to the PCF in the service area to which it belongs, and then each PCF sends the actual traffic rate of the N6 interface to the UDR.
  • the UDR can summarize the actual traffic rate of each N6 interface to obtain the actual traffic rate of the target network area and send it to the UDR.
  • the PCF that has received the first message of the first conversation sends a third message.
  • multiple PCFs in the target network slice may respectively determine the actual traffic rate in its own service area, so that The PCF summarizes the actual traffic rate of multiple PCFs to obtain the actual traffic rate of the target network slice.
  • the fourth message when receiving the fourth message from each PCF in the entire coverage area of the target network slice, the fourth message carries the actual traffic rate of the policy control network element in its own service area; Summarize to get the actual traffic rate of the target network area.
  • each PCF may collect statistics on the actual traffic rate in its own service area, and collect the statistics from the PCF that receives the first message of the first session to obtain the actual traffic rate in the target network area.
  • UPF or SMF can collect the actual uplink and/or downlink traffic rate of each N6 interface in the target network area, and then UPF or SMF can transfer the collected actual traffic rate of the N6 interface to the PCF in the service area to which it belongs.
  • Send, and then, each PCF in the target network area may send a fourth message to the PCF that received the first message of the first session.
  • each access and mobility management network element AMF in the local area can be in its own service area, and each AN is in the target network.
  • the actual traffic bandwidth in the slice is determined, so that the PCF summarizes the actual traffic bandwidth of each AN in the local area in the target network slice to obtain the actual traffic rate of the target network slice.
  • the target network area is a local area in the target network slice
  • the fifth message is received from each access and mobility management network element in the local area in the target network slice, and the fifth message carries access and mobility management.
  • the actual traffic bandwidth of each access network device in the target network slice of the network element in its own service area; the actual traffic bandwidth in each fifth message is summarized to obtain the actual traffic rate of the target network area.
  • each AN in the target network area can measure the uplink and/or downlink traffic bandwidth of the target network area (or target network slice), each AN accesses the network slice through AMF, and each AMF can In its own service area, collect the bandwidth measurement results reported by each AN. After that, the AMF can send the collected bandwidth measurement results obtained by each AN to the PCF in its own service area (that is, receive the first session). The PCF of the first message) is sent.
  • the PCF obtains the upper limit flow rate and the actual flow rate in different ways.
  • PCF can obtain the actual flow rate through NWDAF and the upper limit flow rate through UDR.
  • the PCF can obtain the actual traffic rate and the upper limit traffic rate of the target network area, it can determine the authorized traffic rate of the first session based on the relationship between the two.
  • the authorized flow rate of the first session can be determined by one or more of the following methods: Method 1: Compare the actual flow rate with the upper flow rate (or a value determined based on the upper flow rate), and determine based on the comparison result The authorized flow rate of the first session; Method 2: Obtain the ratio between the actual flow rate and the upper limit flow rate, and compare the ratio with a preset threshold to determine the authorized flow rate of the first session.
  • the first session may include GBR-type services and/or non-GBR-type services. Based on this, the authorized traffic rate of the first session may include at least the following two aspects:
  • the authorized MBR of the GBR service in the first session needs to be determined, which is the same as the contracted MBR of the GBR service (that is, the contracted maximum traffic rate) or the contracted GBR (that is, the contracted minimum traffic rate) ) Related.
  • the maximum bit rate of the authorized set of the first session needs to be determined, that is, the authorized Session-AMBR.
  • the authorized Session-AMBR is related to the contracted Session-AMBR.
  • the subsequent third processing also involves the authorized terminal set maximum bit rate, that is, authorized UE-AMBR.
  • authorized UE-AMBR is related to the UE-AMBR contracted by the terminal.
  • the contracted MBR, the contracted GBR, the contracted Session-AMBR, and the contracted UE-AMBR may come from the contracted data, and the contracted data will be explained in detail later.
  • the method for determining the authorized traffic rate of the first session in combination with the relationship between the actual traffic rate and the upper limit traffic rate of the target network area, the method for determining the authorized traffic rate of the first session will be described. Specifically, there can be at least the following three situations:
  • the first situation when the actual traffic rate and the upper limit traffic rate of the target network area meet the first condition, the contracted maximum traffic rate of the first session is determined as the authorized traffic rate (for ease of description, it will be referred to as the first processing in the following).
  • the first condition indicates that the available traffic rate in the target network area is relatively large. In this case, there is no need to limit the authorized traffic rate of the first session, and the authorized maximum traffic rate of the first session can be directly determined as the authorized traffic rate.
  • the subscription MBR of the first session may be determined as an authorized MBR (GBR type service), and/or the subscription Session-AMBR of the first session may be determined as an authorized Session-AMBR.
  • the first condition can be any of the following:
  • Condition 1.1 The actual traffic rate of the target network area is less than the upper limit traffic rate.
  • Condition 1.2 The actual traffic rate of the target network area is less than or equal to the first traffic rate, where the first traffic rate is less than the upper limit traffic rate.
  • Condition 1.3 The actual flow rate of the target network area is less than the first flow rate, where the first flow rate is less than the upper limit flow rate.
  • Condition 1.4 The ratio between the actual traffic rate of the target network area and the upper limit traffic rate is less than or equal to the preset first threshold; where the first threshold is less than 1.
  • Condition 1.5 The ratio between the actual traffic rate of the target network area and the upper limit traffic rate is less than the preset first threshold; where the first threshold is less than 1.
  • Condition 1.2 and Condition 1.3 for the situation where the actual traffic rate of the target network area is equal to the first traffic rate, the judgment result of whether the first condition is satisfied is different.
  • the PCF determines the authorized traffic rate of the first session, it also adopts different Processing method. For example, according to condition 1.2, if the actual traffic rate of the target network area is equal to the first traffic rate, the PCF performs the first processing; however, according to condition 1.3, if the actual traffic rate of the target network area is equal to the first traffic rate, the PCF does not The first process is executed, but the second process is executed, which will be described later. Conditions 1.4 and 1.5 are also similar situations, so I won’t repeat them.
  • condition 1.2 (or condition 1.3) and condition 1.4 (or condition 1.5) are two different implementation methods, and the first flow rate has nothing to do with the first threshold.
  • the two may be the same or different (for example, in the following example, the first flow rate is 70 and the first threshold is 0.75, Specific instructions will follow).
  • multiple (two or more) conditions that are not conflicting in conditions 1.1 to 1.5 can also be used to determine whether the PCF is executed The first treatment.
  • condition 1.1 conflicts with any one of conditions 1.2 to 1.5; condition 1.2 conflicts with condition 1.3, and condition 1.4 conflicts with condition 1.5. Therefore, a combination of condition 1.2 and condition 1.4, condition 1.2 and condition 1.5, condition 1.3 and condition 1.4, condition 1.3 and condition 1.5 can be adopted to determine whether the first condition is satisfied.
  • the first condition can be determined to be satisfied. For example, when it is determined whether the first condition is satisfied by a combination of condition 1.3 and condition 1.5, as long as any one of condition 1.3 or condition 1.5 is satisfied, it is determined that the first condition is satisfied, and then the first process is executed.
  • the first condition when two or more conditions are used to determine whether the first condition is satisfied, when all the conditions are satisfied, it is determined that the first condition is satisfied. For example, when it is determined whether the first condition is satisfied by a combination of the condition 1.3 and the condition 1.5, when both the condition 1.3 and the condition 1.5 are satisfied, it is determined that the first condition is satisfied, and then the first process is executed.
  • the communication system shown in FIG. 1 is taken as an example for description. Assuming that the target network area is network slice 1, the upper limit traffic rate of network slice 1 is 100 (units are omitted in the subsequent description), the first traffic rate is 70, and the first threshold is 0.75.
  • condition 1.1 When implementing this solution, it can be determined whether the first condition is met according to condition 1.1. At this time, when the actual traffic rate of network slice 1 is within 100 (not equal to 100), and the first condition is met, the PCF can execute the first processing. However, if this condition is not met, the first process will not be executed. The specific process to be executed will be described later.
  • condition 1.2 it may be determined whether the first condition is satisfied according to condition 1.2. At this time, when the actual traffic rate of the network slice 1 is less than or equal to 70 and the first condition is satisfied, the PCF executes the first processing. However, if this condition is not met, the first process will not be executed. The specific process to be executed will be described later.
  • the PCF executes the first processing. However, if this condition is not met, the first process will not be executed. The specific process to be executed will be described later.
  • the solution when the solution is implemented, it can be determined whether the first condition is satisfied according to the condition 1.2 and the condition 1.4, and when at least one of the conditions is satisfied, the first condition is satisfied.
  • the first condition when the actual traffic rate of the network slice 1 is 72, the condition 1.4 is satisfied, but the condition 1.2 is not satisfied.
  • the PCF executes the first processing.
  • the PCF executes the first processing.
  • the PCF does not perform the first processing. The specific processing to be performed will be described later.
  • the solution when the solution is implemented, it can be determined whether the first condition is satisfied according to the condition 1.2 and the condition 1.4, and when the condition 1.2 and the condition 1.4 are satisfied at the same time, the first condition is satisfied.
  • the first condition is satisfied.
  • the PCF does not perform the first processing. illustrate.
  • the PCF performs the first processing.
  • the second case when the actual traffic rate and the upper limit traffic rate of the target network area meet the second condition, the authorized traffic rate of the first session is determined according to the contracted maximum traffic rate of the first session, and the authorized traffic rate is less than that of the first session
  • the maximum traffic rate of the contract (for ease of description, it will be referred to as the second processing in the following).
  • the second condition indicates that the available traffic rate in the target network area is relatively small.
  • the authorized traffic rate of the first session needs to be limited, so that the authorized traffic rate of the first session is less than its contracted maximum traffic rate to avoid exceeding the upper limit traffic rate of the target network area.
  • the second condition can be any of the following:
  • the actual traffic rate of the target network area is less than the upper limit traffic rate.
  • condition 2.1 conflicts with condition 1.1 to condition 1.5 and should not be used at the same time.
  • the PCF may perform the first processing or the second processing.
  • the actual traffic rate of the target network area is greater than the first traffic rate and less than the upper limit traffic rate.
  • condition 2.2 can be used in conjunction with any of the aforementioned condition 1.2, condition 1.4, or condition 1.5.
  • condition 1.2 when the actual traffic rate of the target network area is less than or equal to the first traffic rate, the PCF will determine the maximum traffic rate of the first session as its authorized traffic rate; when the target network area is If the actual flow rate is greater than the first flow rate and less than the upper limit flow rate, the authorized flow rate of the first session determined by the PCF is less than its contracted maximum flow rate.
  • the actual traffic rate of the target network area is greater than or equal to the first traffic rate and less than the upper limit traffic rate.
  • Condition 2.3 can be used in conjunction with any of the aforementioned Condition 1.3, Condition 1.4, or Condition 1.5.
  • Condition 2.4 the ratio between the actual traffic rate of the target network area and the upper limit traffic rate is greater than the preset first threshold, and the actual traffic rate is less than the upper limit traffic rate.
  • Condition 2.4 can be used in conjunction with any of the aforementioned Condition 1.2, Condition 1.3, or Condition 1.4.
  • Condition 2.5 the ratio between the actual traffic rate of the target network area and the upper limit traffic rate is greater than or equal to the preset first threshold, and the actual traffic rate is less than the upper limit traffic rate.
  • condition 2.5 can be used in conjunction with any of the aforementioned condition 1.2, condition 1.3, or condition 1.5.
  • the actual traffic rate is less than the upper limit traffic rate can also be replaced with: the ratio between the actual traffic rate of the target network area and the upper limit traffic rate is less than 1, which will not be repeated.
  • the second condition can be regarded as: the actual traffic rate of the target network area does not reach the upper limit traffic rate, and the first condition is not satisfied.
  • the first condition is the two conditions that do not conflict in Condition 1.1 to Condition 1.5, if the actual traffic rate of the target network area is less than the upper limit traffic rate (or, between the actual traffic rate of the target network area and the upper limit traffic rate) If the ratio of is less than 1), and the first condition is not met, it can be determined that it meets the second condition, and the PCF performs the second processing.
  • the previous text is still used as an example.
  • the upper limit flow rate of network slice 1 is 100 (units are omitted in the subsequent description)
  • the first flow rate is 70
  • the first threshold is 0.75.
  • the solution when the solution is implemented, it can be determined whether the first condition is satisfied according to the condition 1.2 and the condition 1.4, and when the condition 1.2 and the condition 1.4 are satisfied at the same time, the first condition is satisfied.
  • the first condition is satisfied.
  • the PCF does not perform the first processing. illustrate.
  • the PCF performs the first processing.
  • the PCF performs the second processing.
  • the contracted maximum traffic rate of the first session is reduced according to a preset ratio to obtain the authorized traffic rate of the first session.
  • the contracted MBR can be reduced according to the preset first ratio to obtain the authorized MBR.
  • the contracted Session-AMBR can be reduced according to the preset second ratio, and the authorized Session-AMBR can be obtained.
  • the PCF reduces the contracted MBR according to the preset first ratio to obtain an authorized MBR (for the GBR type service of the first session); and/or, the PCF according to The preset second ratio reduces the subscription Session-AMBR, and the authorized Session-AMBR (non-GBR type service for the first session) is obtained.
  • the first ratio and the second ratio may be the same or different, and the specific value of the preset ratio (the first ratio, the second ratio) is not particularly limited in the embodiment of the present application. For example, if the subscription Session-AMBR of the first session is 10, the authorized Session-AMBR of the first session may be determined to be 8 according to the second ratio of 0.8. For another example, if the maximum subscription MBR of the first session is 12, the authorized MBR of the first session may be determined to be 5 according to a first ratio of 0.5. Do not exhaustively.
  • Processing method 2.2 Decrease the contracted maximum traffic rate of the first session by a preset value to obtain the authorized traffic rate of the first session.
  • the contracted MBR can be reduced according to the preset first preset value to obtain the authorized MBR.
  • the subscription Session-AMBR can be reduced according to the preset second preset value, and the authorized Session-AMBR can be obtained.
  • the PCF reduces the contracted MBR according to the preset first preset value to obtain an authorized MBR (for the GBR type service of the first session); and/or, The PCF reduces the contracted Session-AMBR according to the preset second preset value, and obtains the authorized Session-AMBR (non-GBR type service for the first session).
  • the first preset value and the second preset value may be the same or different, and the specific values of the preset values (the first preset value, the second preset value) are not particularly limited in the embodiment of the present application. For example, if the subscription MBR of the first session is 12, the authorized MBR of the first session may be determined to be 9 according to the preset value of 1. For another example, if the subscription Session-AMBR of the first session is 10, the authorized Session-AMBR of the first session may be determined to be 7 according to the preset value of 3. Nor will it be exhaustive.
  • the third case When the actual traffic rate and the upper limit traffic rate of the target network area meet the third condition, the third processing is performed, which will be described in detail later. Among them, the third condition indicates that there is no available traffic rate in the target network area.
  • the PCF when the actual traffic rate of the target network area is less than or equal to the first traffic rate, and condition 1.2 is satisfied, the PCF performs the aforementioned first processing to determine the authorized traffic rate of the first session; When the actual traffic rate in the network area is greater than the first traffic rate and less than the upper limit traffic rate, condition 2.2 is met, and the PCF performs any of the aforementioned second processing to determine the authorized traffic rate of the first session; when the actual traffic in the target network area When the rate is greater than the upper limit flow rate, the third condition is met, and the PCF executes the third process to determine the authorized flow rate of the first session.
  • the PCF executes the foregoing first processing to determine the first session
  • the PCF performs any of the foregoing second processing to determine the authorized traffic rate of the first session
  • the target When the actual traffic rate in the network area is greater than the upper limit traffic rate, the third condition is satisfied, and the PCF performs the third processing to determine the authorized traffic rate of the first session.
  • the third processing may include, but is not limited to, one of the following methods or a combination of multiple methods:
  • Processing method 3.1 Determine the minimum contracted flow rate of the first session as the authorized flow rate.
  • the PCF may determine the minimum contracted flow rate of the first session, that is, the contracted GBR, as the authorized MBR of the first session.
  • the PCF may determine that the authorized Session-AMBR can only guarantee the basic communication of the non-GBR type services, that is, the authorized Session-AMBR is the minimum value of the contracted Session-AMBR.
  • the PCF determines the contracted GBR of the first session as the authorized MBR of the first session (for the GBR type service of the first session); and/or, PCF determines the minimum traffic rate that can only guarantee non-GBR type services as the authorized Session-AMBR for the first session (for non-GBR type services for the first session), that is, the authorized Session-AMBR is the minimum value of the signed Session-AMBR .
  • the network side provides the terminal with a minimum contract flow rate that can meet the most basic communication requirements of the first session, and the first session can be successfully established.
  • the minimum value of the maximum bit rate of the set of contracted terminals of the target network slice is determined as the maximum bit rate of the set of authorized terminals.
  • the PCF can determine the minimum flow rate at which the terminal (the initiator of the first session) can only guarantee service communication as the authorized UE-AMBR of the terminal. In this way, the terminal can access the network slice based on the smallest UE-AMBR, that is, the UE-AMBR is authorized to be the minimum value of the contracted UE-AMBR.
  • Processing method 3.3 refuse to allocate authorized traffic rate for the first session.
  • the processing method 3.3 and the processing method 3.1 cannot be used at the same time.
  • the first session can be denied access to the network.
  • the actual traffic rate of the target network area can be controlled to not exceed or not exceed the upper limit traffic rate as much as possible to ensure that the target has been accessed as much as possible.
  • the PCF may (through other network elements) send a notification message to the terminal, and the notification message is used to instruct the network side to reject the first session access target Network slicing.
  • the PCF may not feed back the first message of the first conversation.
  • the PCF may feed back to the terminal that its authorized traffic rate is 0.
  • Processing method 3.4 Release the QoS Flow of the non-guaranteed bit rate service (non-GBR type service) in the target network area.
  • QoS quality of service
  • one PDU session may contain one or more QoS Flows.
  • the quality of service data flow can also be called: service data flow, user service data flow or QoS flow, which is not particularly limited in this application.
  • a QoS flow can be identified by using a quality of service indicator (QoS class identifier, QCI) or a fifth-generation network quality of service indicator (5G QoS identifier, 5QI).
  • QCI quality of service indicator
  • 5G QoS identifier 5QI
  • Each QoS flow has QoS parameters, and the QoS parameters include: allocation and retention priority (ARP) parameters.
  • ARP parameters mainly include three elements: Priority Level, pre-emption capability and pre-emption vulnerability.
  • the QoS parameters of different QoS flows are generally different.
  • the QoS parameters of the QoS flow can be stored in the subscription data of the terminal, which will be described in detail later.
  • the priority is used for the priority of successfully establishing a session for the QoS flow under the condition of resource shortage.
  • the priority is an integer, and the smaller the value of the priority, the higher the priority. Or, there may be a case where the higher the value, the higher the priority, and there is no special restriction on this.
  • the preemption capability is used to identify whether the Qos flow can preempt other low-priority bearer resources in the case of insufficient resources.
  • the willingness to be preempted is used to identify whether the Qos flow can release the carried resources in the case of insufficient resources.
  • PCF can release all QoS flows of non-GBR type services; or, it can release some QoS flows of non-GBR type services.
  • the PCF can randomly release some QoS flows of non-GBR type services until the actual flow rate is less than the upper limit flow rate.
  • the PCF may release a preset proportion (for example, 50%, 80%, etc.) of the QoS flow of the non-GBR type service of the PDU session among the non-GBR type services of all the PDU sessions currently accessed.
  • the PCF may preferentially release the QoS flow of the non-GBR type service that is accessed first according to the access sequence of the PDU session to which each non-GBR type service belongs to access the target network slice.
  • the PCF may preferentially release the QoS flow of the non-GBR type service with a lower priority according to the priority of the QoS flow of each non-GBR type service. The method and process of releasing the QoS flow are not exhaustively listed.
  • Processing method 3.5 release the low-priority session in the target network area.
  • part of the PDU session (the QoS flow) with a lower priority can be released to release the traffic rate of the target network area as the first session or other
  • the PDU session that has been connected to the target network slice strives for traffic bandwidth.
  • a priority threshold can be preset, so that the PCF can release the PDU session to which the QoS flow with a priority lower than the priority threshold belongs.
  • the PCF may sequentially release the PDU sessions to which each QoS flow belongs in the order of priority from low to high based on the priority order of the QoS flows of each PDU session.
  • the termination conditions for releasing the PDU session may include but are not limited to: the priority of the QoS flow of the remaining PDU session is greater than or equal to the preset priority threshold, and there is no remaining PDU session (all PDU sessions are released) , The actual traffic rate of the target network area is less than the upper limit traffic rate.
  • Processing mode 3.6 Modify the quality of service parameters (QoS parameters) of the first session.
  • the quality of service parameters include: one or more of priority, preemption capability, and willingness to be preempted.
  • the QoS parameters of one or more QoS flows of the first session can be adjusted, which specifically includes: increasing the priority of the QoS flow of the first session, increasing the preemption ability of the QoS flow of the first session, and reducing the first session's QoS flow.
  • a network slice can be composed of M (M is an integer greater than 1) network areas. Therefore, the upper limit flow rate of the network slice can also be divided into M parts, and a network area has an upper limit flow. Rate, the upper limit flow rate can also be regarded as the quota of the network area. It can be understood that the sum of the upper limit flow rates of the M network regions is the upper limit flow rate of the network slice. UDM or UDR can be used to configure the upper limit flow rate of each network area.
  • the PCF can also send a request message to the UDM or UDR, with the request as the target network Area redistributes the upper limit flow rate. Specifically, the request message is used to request to increase the upper limit traffic rate of the target network area.
  • the UDM or UDR that receives the request message can readjust the upper limit flow rate of the target network area based on the traffic usage of other network areas (the relationship between the actual traffic rate and its upper limit flow rate).
  • other network areas may include, but are not limited to: other local network areas in the network slice to which the target network area belongs, or other network slices that are within a preset distance from the target network area, or the terminal communicates with the current AMF through the current AN
  • Other network slices that can be accessed are not exhaustive.
  • the embodiment of the present application has no particular limitation on how the UDM or UDR adjusts the upper limit flow rate of the target network area.
  • the embodiment of the present application provides the following examples for illustration.
  • UDM can determine whether there are other network areas where the ratio of the actual traffic rate to the upper limit traffic rate is less than the preset second threshold, and if there is a difference between the actual traffic rate and the upper limit traffic rate
  • the UDM can reduce the upper limit traffic rate of the first network area and increase the upper limit traffic rate of the target network area. For example, the upper limit flow rate of the first network area is reduced by 30, and the upper limit flow rate of the target network area is increased by 30.
  • UDM can be in other network areas, based on the second network area where the difference between the actual traffic rate and the upper limit flow rate in each network area is greater than the third threshold, and the second network area The number can be one or more.
  • UDM can reduce the upper limit traffic rate of multiple second network areas and increase the upper limit traffic rate of the target network area. For example, the upper limit flow rate of the second network area 1 is reduced by 15, the upper limit flow rate of the second network area 2 is reduced by 10, and the upper limit flow rate of the target network area is increased by 25.
  • the UDM (or UDR) can send a response message to the PCF, the response message indicating the adjusted upper limit flow rate of the target network area.
  • the PCF can re-determine the authorized flow rate of the first session (one or more of authorized UE-AMBR, authorized Session-AMBR, and authorized MBR based on the adjusted upper limit flow rate) ). The method of re-determination is the same as before and will not be repeated.
  • the response message indicates that the upper limit traffic rate of the target network area remains unchanged, or indicates that there is no adjustable quota.
  • UDM (or UDR) has determined that there is no first network area or second network area, and cannot allocate additional quotas to the target network area.
  • UDM may refuse to adjust the upper limit flow rate for the target network area.
  • the PCF when the PCF receives the response message, it can implement adjustments in combination with the aforementioned processing methods 3.1 to 3.6. For example, when the PCF fails to apply for adjusting the upper limit flow rate for the target network area, the PCF may refuse to allocate the authorized flow rate for the first session.
  • PCF can be used in the aforementioned processing methods 3.1 to 3.7, except that 3.1 and 3.3 cannot be used at the same time, according to one or two or more of the processing methods to achieve the target Flow control in the network area.
  • processing method 3.1 can be used in combination with other processing methods (one or more of 3.2, 3.4 to 3.7) in addition to processing method 3.3 .
  • the processing method 3.3 can be used in combination with other processing methods (one or more of 3.2, 3.4 to 3.7) except for processing method 3.1.
  • processing method 3.1 and processing method 3.2 can be used in combination. That is, when the actual traffic rate of the target network area is greater than or equal to the upper limit traffic rate, the PCF may determine the minimum contracted traffic rate of the first session (the minimum value of GBR and/or contracted Session-AMBR) as the authorized traffic rate, And, the PCF may also determine the minimum value of the contracted UE-AMBR of the target network slice as the authorized UE-AMBR.
  • the minimum contracted traffic rate of the first session the minimum value of GBR and/or contracted Session-AMBR
  • the processing methods 3.1 to 3.2 and 3.4 to 3.7 can be used in combination. That is, when the actual traffic rate of the target network area is greater than or equal to the upper limit traffic rate, the PCF may determine the minimum subscribed traffic rate of the first session (the minimum value of GBR and/or subscribed Session-AMBR) as the authorized traffic rate; And, the PCF can also determine the minimum value of the contracted UE-AMBR of the target network slice as the authorized UE-AMBR; and, the PCF can also release the QoS Flow of the non-GBR type service in the target network area; and, the PCF can also The PDU session to which the QoS flow whose priority is lower than the preset priority threshold belongs can be released; and the PCF can also modify one or more QoS parameters of the QoS Flow in the first session.
  • the minimum subscribed traffic rate of the first session the minimum value of GBR and/or subscribed Session-AMBR
  • the PCF can also determine the minimum value of the contracted UE-AMBR
  • the processing methods 3.2 to 3.7 can be used in combination. That is, when the actual traffic rate of the target network area is greater than or equal to the upper limit traffic rate, the PCF may refuse to allocate the authorized traffic rate for the first session; and, the PCF may also slice the target network to the minimum value of the contracted UE-AMBR to determine To authorize the UE-AMBR; and, the PCF can also release the QoS Flow of non-GBR type services in the target network area; and the PCF can also release the PDU session to which the QoS flow with the priority lower than the preset priority threshold belongs; And, the PCF may also modify one or more QoS parameters of the QoS Flow in the first session; and, the PCF may also request the UDR or UDM to adjust the upper limit flow rate of the target network area.
  • the contracted MBR, the contracted GBR, the contracted Session-AMBR, the contracted UE-AMBR, and the default 5QI (5G QoS identifier, 5G service quality identifier) and ARP and other QoS parameters can all be stored in the terminal's contract data middle.
  • the subscription data of the terminal may also be referred to as: session management subscription information, and the naming thereof is not particularly limited in the embodiment of the present application.
  • the contract data of the terminal may be determined when the terminal signs to the network (registration process).
  • the subscription data of the terminal may also be modified or edited by other network elements, such as an application function (AF) network element. This process will be explained later, which will not be repeated here.
  • AF application function
  • the subscription data of the terminal can generally be stored in the UDR, and the UDM (or other network element) can retrieve the subscription data from the UDR, and the subscription data can be checked by itself or other network elements. Make further modifications or applications.
  • the SMF may receive the eighth message.
  • the SMF may request the UDM for the subscription data of the terminal based on the identification of the terminal carried in the eighth message.
  • UDM can retrieve the terminal's subscription data from the UDR and send the terminal's subscription data to the SMF. Therefore, the SMF can send a session policy request message for creating the first session to the PCF based on these subscription data, and the PCF can then determine the authorized traffic rate of the first session based on the processing shown in FIG. 4.
  • UDM can take out the subscription data of the terminal from the UDR and send it to the PCF or SMF, and the PCF can specify the QoS parameters for the dedicated QoS flow according to the needs of the applicable service (equivalent to QoS for the dedicated QoS flow) Configuration or modification of parameters), and pass the specified QoS parameters to the SMF.
  • the PCF can specify the QoS parameters for the dedicated QoS flow according to the needs of the applicable service (equivalent to QoS for the dedicated QoS flow) Configuration or modification of parameters), and pass the specified QoS parameters to the SMF.
  • the SMF can obtain the subscription data of the terminal from the UDM or UDR, or can receive the specified QoS parameters configured by the PCF. Based on these data, the SMF can analyze the QoS flow currently being processed (created or modified). The QoS parameters (including ARP parameters) are determined (configured or modified), and the determined QoS parameters are passed to the radio access network (radio access network, RAN) through the AMF. Correspondingly, the RAN can determine whether the current QoS flow can preempt resources carried by other low-priority QoS flows based on the received QoS parameters. I will not elaborate on this.
  • the PCF can determine the authorized flow rate of the first session, and then send it to the control network element of the first session, and the control network element can realize the flow control of the first session based on the authorized flow rate. Realize the flow control of the target network area.
  • the PCF may directly send the authorized flow rate of the first session to its controlling network element separately, or the PCF may carry the authorized flow rate of the first session in other messages and send it to the controlling network element along with the message. .
  • the PCF may send a policy and charging control rule (PCC rule) message to the control network element, where the PCC rule carries the authorized traffic rate of the first session.
  • PCC rule policy and charging control rule
  • PCF and the control network element of the first session may interact directly or indirectly through the forwarding of other network elements, which is not limited.
  • control network element side can perform flow control on the first session according to the method shown in FIG. 5.
  • the method includes:
  • the method for determining the authorized traffic rate on the PCF side can refer to the specific implementation of S404 in Figure 4 above, and the method for obtaining the actual traffic rate of the target network area on the PCF side can also refer to S402 in Figure 4 above.
  • the specific implementation method. I will not repeat it here.
  • the authorized traffic rate received by the control network element is determined by the PCF.
  • the control network element can receive the authorized traffic rate directly sent by the PCF, or indirectly (via the forwarding of other network elements) from the authorized traffic from the PCF. rate.
  • S504 Perform flow control on the first session based on the authorized flow rate.
  • control network element of the first session may include SMF.
  • the initiating terminal of the first session may also serve as the control network element of the first session to control the uplink traffic rate of the first session.
  • the control network element of the first session includes: SMF and terminal.
  • the method of performing flow control on the first session can be:
  • the control user plane network element allocates a quality service flow (QoS Flow) for the first session, so that the maximum flow rate of the first session is determined based on the maximum flow rate of the allocated quality service flow of the first session.
  • QoS Flow quality service flow
  • the SMF can modify the newly allocated QoS Flow of the first session And/or modify the MFBR of the original QoS Flow so that the sum of the MFBR of all QoS Flows of the first session does not exceed the authorized flow rate of the first session.
  • the first session may include multiple QoS Flows. It is assumed that the current QoS Flow allocated by the UPF for the first session is: QoS Flow1 to QoS Flow5, and the QoS Flow currently allocated by the UPF for the first session is QoS Flow6.
  • SMF can modify the MFBR of QoS Flow6, and/or, SMF can also modify one or more of QoS Flow1 ⁇ QoS Flow5 Modify the MFBR of QoS Flow1 to QoS Flow6 so that the sum of MFBR of QoS Flow1 to QoS Flow6 does not exceed the authorized MBR of the first session.
  • the first session may include GBR QoS Flow and/or non-GBR QoS Flow. Therefore, when SMF performs flow control on the first session, the control may be performed in the following manner:
  • Modify the newly allocated maximum flow rate of the GBR QoS Flow (GBR QoS Flow). For example, modify the MFBR of QoS Flow6 described in the foregoing example.
  • the SMF can modify the MFBR of one or more of QoS Flow1 to QoS Flow5.
  • the SMF controls the UPF to allocate QoS Flow for the first session
  • the UPF allocates QoS Flow for the first session
  • the SMF can send the authorized Session-AMBR of the first session to the UPF through the N4 interface.
  • the UPF controls the uplink traffic rate of the non-GBR type service of the first session according to the received UL Session-AMBR, and controls the first session
  • the downstream traffic rate of the non-GBR type service is controlled according to the received DL Session-AMBR.
  • SMF can determine the following information based on the received PCC rule: QoS flow detection rules, QoS flow identification, and guaranteed upstream and downstream traffic rates for each QoS flow (guaranteed flow bit rate, GFBR) and maximum flow rate (maximum flow bit rate, MFBR).
  • the SMF can send this information to the UPF through the N4 interface to request the UPF to allocate QoS Flow for the first session.
  • UPF can control according to the uplink MFBR (that is, UL MFBR).
  • UPF can be controlled according to downlink MFBR (that is, DL MFBR).
  • the SMF can separately control the uplink and downlink flow rates of the first session based on the received authorized flow rate.
  • the terminal that initiates the creation or modification request of the first session to the network side may also serve as the control network element of the first session.
  • the PCF may also send the authorized flow rate of the first session to the terminal.
  • the terminal also serves as the control network element of the first session, and can perform flow control on the upstream flow rate of the first session based on the received authorized flow rate.
  • the terminal has no right to control the downstream flow rate. Therefore, using the terminal as the control network element of the first session can cooperate with the uplink and downlink flow control mode on the SMF side to achieve flow control.
  • the terminal can control the uplink traffic rate of the non-GBR type service of the first session, which does not exceed the authorized UL Session-AMBR; and can control the uplink traffic rate of the GBR type service of the first session, which does not exceed the authorized UL MBR .
  • FIG. 6 shows a schematic diagram of information exchange of a flow control method provided by an embodiment of the present application. As shown in Figure 6, the method includes:
  • the PCF sends a rate analysis request for the candidate network area to the NWDAF.
  • the candidate network area may be the entire coverage area or a partial area of the candidate network slice; the number of candidate network slices may be one or more; and the candidate network slice is a network slice managed by the PCF.
  • the PCF has the management authority of network slice 1 to network slice 3, and the PCF can send a rate analysis request for network slice 1 to network slice 3 to NWDAF.
  • NWDAF interacts with UDR to obtain the upper limit traffic rate of the candidate network area.
  • NWDAF may send a request for obtaining the upper limit flow rate to the UDR, and receive a response message from the UDR, the response message carrying the upper limit flow rate of the candidate network area.
  • the UDR can also periodically or periodically send the upper limit flow rate of each network slice for which each PCF has management authority to the NWDAF, and the NWDAF can receive the data from the UDR and obtain the upper limit flow rate of the candidate network area from it.
  • the A network element when it involves the process of interacting between two network elements to obtain certain information (or data), it may be that the A network element sends a request message to the B network element, and the A network element receives the information from the B The network element responds to the message to obtain this information; or, the network element B can also send a message to the network element A regularly or periodically, and the network element A directly receives the message to obtain the information.
  • the details are not repeated, and this method can be adopted.
  • the UDR can obtain data from the UDM.
  • NWDAF can also directly interact with UDM to obtain the upper limit traffic rate of the candidate network area, which will not be repeated.
  • NWDAF interacts with SMF to obtain the actual traffic rate of each N6 interface in the candidate network area.
  • the analysis result notification carries the actual traffic rate and the upper limit traffic rate of the candidate network area.
  • the actual traffic rate of the candidate network area may be aggregated by NWDAF. That is, SMF can collect the actual traffic rate at each N6 interface in the candidate network area and report it to NWDAF; then, NWDAF will sum up the actual traffic rate at each N6 interface in the candidate network area to obtain the candidate network area The actual traffic rate.
  • the actual traffic rate of the candidate network area may be obtained by SMF aggregation. That is, SMF can collect the actual traffic rate at each N6 interface in the candidate network area, and then SMF summarizes the collected actual traffic rate at each N6 interface to obtain the actual traffic rate in the candidate network area, and send it to NWDAF The actual traffic rate of the candidate network area.
  • S610 The UE sends a request message for the first session to the AMF through the AN.
  • the request message for the first session may be specifically: a session establishment request message for the first session.
  • the message is used to request the creation of the first session.
  • the request message of the first session may also be a session modification message of the first session, which will not be detailed here.
  • the message may carry identification information of the target network area, and is used to request access to the target network area and establish a PDU session.
  • the request message of the first session may carry the S-NSSAI of the target network slice.
  • the target network area belongs to the candidate network area.
  • the target network area may be a partial area in the candidate network area.
  • the candidate network slice is multiple network slices, and the target network area is one network slice among the multiple network slices, or a local area of one of the network slices.
  • the candidate network areas are network slice 1 to network slice 3, and the PCF can obtain the actual traffic rate of network slice 1 to network slice 3 based on NWDAF.
  • the request message of the first session carries S-NSSAI1
  • the network slice 1 identified by S-NSSAI1 is the target network slice.
  • network slice 1 (target network slice) belongs to candidate network slices (network slice 1 to network slice 3).
  • the target network area is the entire coverage area in the candidate network area.
  • the candidate network slice is network slice 1
  • the target network area is also network slice 1.
  • the AMF sends a context request message for creating the first session to the SMF.
  • the context request message for creating the first session (PDU session) carries identification information of the target network area.
  • the context request message for creating the first session is the eighth message mentioned above, and the AMF sends the eighth message to the SMF based on the received session establishment request message for the first session.
  • S614 The SMF interacts with the UDR to obtain the subscription data of the UE.
  • the subscription data of the UE may include but is not limited to: subscription Session-AMBR, subscription MBR, default QoS parameters such as 5QI and ARP, which will not be described in detail.
  • the SMF can also directly interact with the UDM to obtain the subscription data of the UE, which will not be repeated.
  • S616 The SMF sends a session policy request message for creating the first session to the PCF.
  • the SMF sends a first message to the PCF, and the first message carries the subscription data of the UE.
  • the session policy request message may also carry the following information: terminal identifier, terminal user group identifier, session type, data network name, terminal IPv4 address or IPv6 network prefix, target network slice S-NSSAI (or further carries the identification of one or more local areas in the network slice), subscribed Session-AMBR, subscribed MBR, and default QoS parameters such as 5QI and ARP.
  • S618 The PCF interacts with the UDR to obtain policy data related to the first session.
  • PCF can also directly interact with UDM to obtain policy data related to the first session.
  • the policy data of the first session includes: one or more of application-related information from the AF, indication information of whether to perform flow control on the target network area, and the uplink and downlink upper limit flow rates of the target network slice.
  • the application-related information comes from the AF, which can be sent by the AF through the N5 interface or the Rx interface.
  • the application-related information may include: the detection rules of the applied uplink and downlink data streams, the minimum bandwidth required by the application service, the maximum bandwidth that the application service may use, and so on.
  • the aforementioned step S604 can be omitted, and the PCF can obtain the upper limit flow rate of the target network area in this step.
  • the PCF obtains the actual flow rate and the upper-limit flow rate in the order and manner in which there is no specific correlation, and the PCF can obtain the actual flow rate and the upper-limit flow rate through any of the foregoing methods.
  • S620 The PCF determines the authorized traffic rate of the first session.
  • the PCF may determine the authorized flow rate of the first session based on the actual flow rate and the upper limit flow rate of the target network area. There are many ways to implement it. For details, please refer to the preceding text, which will not be repeated here.
  • the authorized traffic rate of the first session may include: authorized Session-AMBR and/or authorized MBR of the first session.
  • S622 The PCF sends a create session management policy control response message to the SMF.
  • the message carries the authorized traffic rate of the first session.
  • the create session management policy control response message may carry the authorized Session-AMBR and/or authorized MBR of the first session.
  • the create session management policy control response message may be carried in the PPCrule message.
  • S624 The SMF sends a create first session context response message to the AMF.
  • the message carries the authorized Session-AMBR of the first session.
  • the AMF sends an N2 interface session establishment request message to the AN.
  • This message is used to request the AN to establish an N2 interface session, and the message carries the authorized Session-AMBR of the first session.
  • the AN creates an N2 interface session for the first session, and sends a session establishment accept message to the UE.
  • S630 The SMF controls the uplink and downlink flow of the first session based on the authorized flow rate of the first session.
  • the flow control of the first session by the SMF may include one or more of the following: based on the authorized UL Session-AMBR, the flow control of the upstream traffic of the non-GBR service; based on the authorized DL Session-AMBR, the non- Flow control is performed on the downstream traffic of GBR services; the upstream flow of GBR services is controlled based on the authorized UL MBR; or the downstream traffic of GBR services is controlled based on the authorized DL MBR.
  • the specific control method is detailed in the aforementioned Figure 5 and related embodiments, and will not be described in detail.
  • S632 The UE controls the uplink traffic of the first session based on the authorized Session-AMBR of the first session.
  • the terminal side can perform flow control on the upstream traffic of the non-GBR type service of the first session.
  • the PCF may obtain the actual traffic rate of the target network slice based on the interaction with the NWDAF, and the PCF may obtain the upper limit traffic rate of the target network area through the interaction with the UDR. Furthermore, the PCF determines the authorized Session-AMBR and the authorized MBR of the first session accordingly, and implements traffic management of the first session and the target network area accordingly.
  • each PCF may collect the N6 interfaces collected by each SMF in its own service area.
  • each PCF in the target network slice (or target network area) can report the collected data to UDM, UDR, or a certain PCF, and these network elements are aggregated to obtain the target network slice (or target network area). Area) actual traffic rate.
  • FIG. 7 shows this situation.
  • PCF1 is used as the executive body of this solution.
  • FIG. 7 shows an SMF in the service area of PCF1, that is, SMF1 in FIG. 7; and, for example, FIG. 7 also shows PCF2 in the target network area, and SMF2 in the PCF2 service area.
  • the target network area may include but is not limited to PCF1, and PCF2 is only exemplary, and there is no particular limitation on the number of PCFs included in the target network area, for example.
  • each PCF includes one or more SMFs.
  • FIG. 7 only exemplarily shows one SMF in one PCF service area, and there is no particular limitation on the number of SMFs included in the PCF service area, for example.
  • the method includes the following steps:
  • S702 PCF1 sends a service area slice bandwidth measurement request to SMF1.
  • the request may carry the identifier of the network slice in the SMF service area (S-NSSAI).
  • S704 The SMF1 sends a report request of the traffic bandwidth measurement result to the UPF.
  • the report request is used to instruct the UPF to report the traffic bandwidth measurement result.
  • the report request can be sent through the N4 interface.
  • UPF can monitor and measure the upstream and downstream traffic rates of each N6 interface in the service area of SMF1, and report traffic bandwidth measurement result 1 to SMF1.
  • the data contained in the traffic bandwidth measurement result 1 is: the upstream and downstream traffic rates of each N6 interface in the service area of SMF1.
  • UPF can periodically report traffic bandwidth measurement results 1; alternatively, UPF can periodically report traffic bandwidth measurement results 1; alternatively, UPF can also report traffic when the change in the actual traffic rate exceeds the preset change threshold Bandwidth measurement result 1.
  • the change in the actual flow rate refers to the difference between the actual flow rate collected in the current unit time interval and the actual flow rate collected in the previous unit time interval, or the absolute value of the difference.
  • the unit time interval may be preset based on the actual scene. For example, the unit time interval may be 1s, or may be 10s, 1min, etc., which is not exhaustive, and there are no other restrictions.
  • SMF1 determines the uplink and downlink traffic rates of the SMF1 service area.
  • SMF1 separately summarizes the upstream and downstream traffic rates of each N6 interface in the service area to obtain the upstream and downstream traffic rates of the SMF1 service area. That is, SMF1 summarizes the upstream traffic rate of each N6 interface in the service area to obtain the upstream traffic rate of the SMF1 service area; and SMF1 summarizes the downstream traffic rate of each N6 interface in the service area to obtain the SMF1 service area Downstream traffic rate.
  • this step can be omitted, and SMF1 can directly send the uplink and downlink traffic rates of each N6 interface in its service area to PCF1, and PCF1 directly performs summary processing.
  • S710 SMF1 sends traffic bandwidth measurement result 2 to PCF1.
  • the data carried by the traffic bandwidth measurement result 2 is: the upstream and downstream traffic rates of the service area of SMF1.
  • PCF2 interacts with SMF2 to obtain traffic bandwidth measurement result 3.
  • the data carried by the traffic bandwidth measurement result 3 is: the upstream and downstream traffic rates of each N6 interface in the SMF2's own service area.
  • the process of this part is similar to the process of S702 to S706.
  • SMF2 can interact with the PCF in its own service area to obtain the uplink and downlink traffic rates of each N6 interface in the SMF2's own service area.
  • the data carried by the traffic bandwidth measurement result 3 is: the upstream and downstream traffic rates of the service area of SMF2.
  • This part of the processing process is similar to the process of S702 ⁇ S710.
  • SMF2 can interact with the PCF in its own service area to obtain the uplink and downlink traffic rates of each N6 interface in SMF2's own service area. Then, SMF2 can also serve itself
  • the uplink and downlink traffic rates of each N6 interface in the area are respectively summarized and processed to obtain the uplink and downlink traffic rates of the service area of SMF2.
  • S712 can be earlier than S702, or later than S702, or it can be executed in S702 ⁇ S710. Any step in the process is realized.
  • the step symbol (for example, S712) has no special restriction on the execution order of the steps.
  • PCF2 sends traffic bandwidth measurement result 3 to PCF1.
  • the PCF1 summarizes the traffic bandwidth measurement result 2 and the traffic bandwidth measurement result 3 to obtain the actual traffic rate of the target network area.
  • PCF1 interacts with UDM to obtain the upper limit traffic rate of the target network area.
  • S720 to S742 are performed between PCF1, UDM, NWDAF, UPF, SMF1, AMF1, CN and the UE.
  • the specific interaction process is shown in FIG. 7, and the specific implementation of these steps can refer to the description of S610 to S632 in the embodiment shown in FIG. 6.
  • the execution of S720 to S742 in Figure 7 uses SMF1 and PCF1 to achieve interaction. The description will not be repeated.
  • the flow control method provided in the embodiments of the present application may be applicable to the situation where the UE is in the home network or roams to the visited network.
  • the home network also known as the home public land mobile network (HPLMN)
  • HPLMN home public land mobile network
  • the visited network is also called the visited public land mobile network (visit public land mobile network, VPLMN).
  • VPLMN visited public land mobile network
  • the network slice that the terminal accesses at A is the home network; when the terminal roams to B, it needs to be served by the network at B. At this time, the terminal accessed The network slice at B is the visited network.
  • the PCF in the foregoing embodiment is the PCF in the home network.
  • the session type of the PDU session (first session) also needs to be considered.
  • the aforementioned PCF that determines the authorized traffic rate of the first session is the PCF in the current visited network; or, when the terminal roams to the visited network, and
  • the aforementioned PCF that determines the authorized traffic rate of the first session is the PCF in the home network of the terminal.
  • the PCF can determine the authorized traffic rate of the first session based on the terminal's subscription data.
  • the terminal's subscription data may be controlled by AF in addition to the terminal's subscription to the network. .
  • FIG. 8 shows a schematic diagram of information exchange of a flow control method provided in an embodiment of the present application.
  • the method includes the following steps:
  • the AF sends a sixth message to PCF1.
  • the sixth message is used to request the policy control network element to feed back the actual traffic rate of the target network area, or the sixth message is used to request the policy control network element to periodically feed back the actual traffic rate of the target network area, or the sixth message is used to request The policy control network element feeds back the actual traffic rate of the target network area when the preset conditions are met.
  • the bandwidth data of the target network area includes: the actual traffic rate and the upper limit traffic rate of the target network area.
  • the sixth message may carry identification information of the target network area, such as S-NSSAI carrying the target network slice.
  • PCF1, SMF1, UPF, SMF2, PCF2, and UDM perform data exchange, and perform the steps shown in S804 to S820 as shown in FIG. 8.
  • S702 to S718 in FIG. 7. I won't repeat it here.
  • the PCF1 sends a seventh message to the AF, where the seventh message carries the actual traffic rate.
  • the seventh message may also carry the upper limit flow rate.
  • step S822 may be executed after S820.
  • step S822 may be executed after S818.
  • the AF determines the second application information parameter according to the upper limit traffic rate and the actual traffic rate of the target network area.
  • the actual traffic rate is used to indicate the sum of traffic rates occupied by all sessions that have been accessed by the network slice in the target network area.
  • the determination method can refer to the foregoing and implement it using any one of the foregoing implementation manners, and will not be repeated here.
  • the second application information parameter is used to describe the bandwidth requirement and service priority of the first application that provides the service, which will be described in detail later.
  • the PCF1 can obtain the subscription data of the terminal based on the second application information parameter, and with this, realize the flow rate control of the target network area.
  • the method further includes: steps S828 to S848.
  • steps S828 to S848 As shown in Figure 8, in S828 ⁇ S848, PCF1, UDM, NWDAF, UPF, SMF1, AMF1, CN and UE interact, the specific interaction process and the specific implementation of these steps can be referred to as shown in Figure 6.
  • AF can obtain the actual traffic rate of the target network area in the target network slice. AF also determines the second application information parameter according to the upper limit traffic rate and actual traffic rate of the target network area, and AF sends the first application information parameter to the PCF. 2. Application information parameters.
  • the second application information parameter may include, but is not limited to: one or more of the bandwidth requirement parameter of the application session, the bandwidth requirement parameter of the application service flow, the service priority, and the preemption order parameter under the same priority.
  • the bandwidth requirement parameters of the application service flow include: the second subscription flow rate, the second subscription flow rate is used to limit the minimum flow rate and/or the maximum flow rate of the first session related to the first application in the target network area, and the second The contracted traffic rate indicates the minimum traffic rate required for the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate.
  • AF performs the aforementioned step S808, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset target threshold, the first application information parameter can be adjusted to obtain the second application Information parameters.
  • the AF can adjust the upstream-related parameters in the first application information parameter to obtain the adjusted The second application information parameter.
  • AF can also adjust the first application information parameters (including uplink related parameters and downlink related parameters) , Get the second application information parameter.
  • the AF may adjust the downlink-related parameters in the first application information parameter to obtain the adjusted first 2.
  • Application information parameters when the ratio between the actual flow rate in the uplink direction and the upper limit flow rate is greater than or equal to the first target threshold, AF can also adjust the first application information parameters (including uplink related parameters and downlink related parameters) , Get the second application information parameter.
  • the first target threshold and the second target threshold may be the same or different.
  • the AF does not need to adjust the first target threshold.
  • the AF may determine the first application information parameter as the second application information parameter.
  • the AF does not need to send the determined second application information parameter (that is, the first application information parameter) to the PCF.
  • the AF may send the determined second application information parameter to the PCF.
  • the first application information parameter involved in the foregoing steps may be determined when the AF signs a contract with the network side (for example, subscribes to a network slice).
  • the first application information parameter can come from UDM or UDR.
  • the first application information parameter may also be recorded in a storage location readable by the AF.
  • the AF may adjust the first application information parameter in one or more of the following ways:
  • AF may adjust the first application information, which specifically includes: changing the session bandwidth requirement of the application service Or reduce the bandwidth requirements of the application service flow, modify the attributes of some non-urgent and important application sessions to allow preemption, reduce the default resource preemption and retention priority of the application session, and modify the preemption order under the same priority.
  • modifying the preemption sequence under the same priority level can be: preempting the first established service flow first to preempting the service flow with the largest bandwidth usage.
  • the second application information parameter can be determined, and the second application information parameter can be sent to the PCF.
  • the AF can reduce the first subscription traffic rate to obtain the second subscription traffic rate. For example, reducing a fixed value on the basis of the first subscription flow rate, or reducing the first subscription flow rate according to a preset third ratio to obtain the second subscription flow rate, etc., etc., not exhaustively listed.
  • the PCF may determine the authorized flow rate of the first session based on the second subscription flow rate in the second application information parameter. That is, the subscription data of the terminal involved in any of the foregoing embodiments may come from the subscription data in the UDM, or may also be determined by the PCF based on the second application information parameter.
  • the PCF can determine the authorized flow rate of the first session, and accordingly implement flow control on the target network area.
  • the PCF may also send the authorized traffic rate of the first session to the controlling network element of the second session.
  • the service of the second session is the same as the service of the first session, and/or the application to which the second session belongs is the same as the application to which the first session belongs. In this way, the flow control of sessions of the same type of service or the flow control of multiple sessions of the same application can be achieved through the foregoing process.
  • the authorized traffic rate of the first session can be determined according to any of the foregoing methods, so that the authorized traffic can be sent to the initiating terminal of the first session and the SMF of the first session rate.
  • the session of the same type of video service for example, the session of the same type of video service of APP2
  • the PCF also sends the second session to the initiating terminal and the first session.
  • the SMF of the second session sends the authorized traffic rate.
  • the session of other services of APP1 can be used as the second session.
  • the PCF also sends the second session to the initiating terminal of the second session.
  • the SMF sends the authorized traffic rate.
  • the second session may be a newly accessed session, or may also be a session that has already accessed the target network area.
  • the flow control method provided by the embodiment of the present application can implement flow control on the entire target network area by performing flow control on both the newly accessed session and the accessed session.
  • Figure 9 shows a schematic diagram of the physical structure of a network device.
  • the network device can be used to implement the method on the PCF side, the control network element side, or the corresponding part of the AF side described in the foregoing method embodiment. For details, refer to the description in the foregoing method embodiment.
  • the network device 900 may include one or more processors 910, and the processor 910 may also be referred to as a processing unit, which may implement certain control functions.
  • the processor 910 may be a general-purpose processor or a special-purpose processor.
  • the processor 910 may also store instructions, and the instructions may be executed by the processor, so that the network device 900 executes the corresponding terminal or network device described in the above method embodiment or The method of the core network node.
  • the network device 900 may include a circuit, and the circuit may implement the sending or receiving or communication function in the foregoing method embodiment.
  • the network device 900 may include one or more memories 920, on which instructions or intermediate data are stored, and the instructions may be executed on the processor 910, so that the network device 900 executes the foregoing The method described in the method embodiment.
  • other related data may also be stored in the memory.
  • instructions and/or data may also be stored in the processor 910.
  • the processor 910 and the memory 920 may be provided separately or integrated together.
  • the network device 900 may further include a transceiver 930.
  • the transceiver 930 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and is used to implement the transceiver function of the network device.
  • the network device is a PCF, it is used to implement the operation of controlling the network element corresponding to the first session of the PCF in the embodiment shown in FIG. 4 to send the authorized traffic rate.
  • the transceiver 930 in the PCF may send the authorized traffic to the SMF. rate.
  • the transceiver 930 can further perform other corresponding communication functions.
  • the processor is used to complete the corresponding determination or control operation, and optionally, can also store corresponding instructions in the memory. For the specific processing manner of each component, reference may be made to the related description of the foregoing embodiment.
  • the transceiver 930 in the SMF can receive the authorized traffic from the PCF rate.
  • the transceiver 930 can further perform other corresponding communication functions.
  • the processor is used to complete the corresponding determination or control operation, and optionally, can also store corresponding instructions in the memory.
  • the transceiver 930 in the AF may send the sixth message to the PCF1.
  • the transceiver 930 may also be used to complete other related communication operations, and the processor may also be used to complete other corresponding determination or control operations.
  • corresponding instructions can also be stored in the memory.
  • the processor and transceiver described in this application can be implemented in integrated circuit (IC), analog IC, radio frequency integrated circuit RFIC, mixed signal IC, application specific integrated circuit (ASIC), printed circuit board ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be manufactured using various 1C process technologies, such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), and P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the network device may be a stand-alone device or may be part of a larger device.
  • the device may be: (1) an independent integrated circuit IC, or chip, or, a chip system or subsystem; (2) a set of one or more ICs.
  • the set of ICs may also include Storage components for storing data and/or instructions; (3) ASIC, such as a modem (MSM); (4) modules that can be embedded in other devices; (5) receivers, terminals, cellular phones, wireless devices, and handhelds , Mobile units, network equipment, etc.; (6) Others, etc.
  • MSM modem
  • FIG. 10 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • the network device 1000 may include: a processing module 1020 and a transceiver module 1040.
  • the transceiver module 1040 is used to obtain the actual traffic rate of the target network area in the target network slice, and the actual traffic rate is used to indicate the sum of traffic rates occupied by all sessions that the network slice has accessed in the target network area; processing module 1020 , Used to determine the authorized flow rate of the first session according to the upper limit flow rate of the target network area and the actual flow rate. The authorized flow rate is used to indicate the maximum flow rate allowed for the first session; the transceiver module 1040 is also used to send the first session to the The rate of authorized traffic sent by the controlling network element of the session.
  • the processing module 1020 is further configured to: receive a first message, where the first message is used to request to establish the first session or to request to modify the first session.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the processing module 1020 is specifically configured to: when the actual flow rate is less than the upper limit flow rate, determine the contracted maximum flow rate of the first session as the authorized flow rate; or, when the actual flow rate is less than When it is equal to or equal to the first flow rate, the maximum contracted flow rate of the first session is determined as the authorized flow rate, where the first flow rate is less than the message upper limit flow rate; or, when the actual flow rate is less than the first flow rate, the first The maximum contracted flow rate of a session is determined as the authorized flow rate; or, when the ratio between the actual flow rate and the upper limit flow rate is less than or equal to the preset first threshold, the maximum contracted flow rate of the first session is determined as the authorized flow rate The flow rate, where the first threshold is less than 1; or, when the ratio between the actual flow rate and the upper limit flow rate is less than the first threshold, the contracted maximum flow rate of the first session is determined as the authorized flow rate.
  • the processing module 1020 is specifically configured to: when the actual flow rate is less than the upper limit flow rate, determine the authorized flow rate according to the contracted maximum flow rate of the first session; wherein the authorized flow rate is less than the contracted flow rate.
  • Maximum traffic rate or, when the actual traffic rate is greater than the first traffic rate and less than the upper limit traffic rate, the authorized traffic rate is determined according to the contracted maximum traffic rate of the first session; where the authorized traffic rate is less than the contracted maximum traffic rate, the first A flow rate is less than the upper flow rate; or, when the actual flow rate is greater than or equal to the first flow rate and less than the upper flow rate, the authorized flow rate is determined according to the contracted maximum flow rate of the first session; where the authorized flow rate is less than The maximum contracted flow rate; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than the preset first threshold and the ratio is less than 1, the authorized flow rate is determined according to the contracted maximum flow rate of the first session; where, The authorized traffic rate is less than the contracted maximum traffic rate; or,
  • the processing module 1020 is specifically configured to: when the actual flow rate is greater than or equal to the upper limit flow rate, determine the contracted minimum flow rate of the first session as the authorized flow rate, or set the target The minimum value of the maximum bit rate of the subscribed terminal set of the network slice is determined as the maximum bit rate of the authorized terminal set.
  • the transceiver module 1040 is further configured to: receive the second subscribed traffic rate from the application function network element, and the second subscribed traffic rate is used to limit the first session related to the first application to the target The minimum traffic rate and/or the maximum traffic rate of the network area, and the second subscription traffic rate indicates the minimum traffic rate required by the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate; The second subscription traffic rate is determined according to the first subscription traffic rate and the actual traffic rate.
  • the processing module 1020 is further used for one or more of the following: refusing to allocate the authorized traffic rate for the first session; in the target network area Release the service quality data stream of the non-guaranteed bit rate service; release the low-priority session in the target network area; modify the service quality parameters of the first session.
  • the service quality parameters include: priority, preemption capability, and willingness to be preempted. one or more.
  • the transceiver module 1040 is further configured to: send the authorized traffic rate to the control network element of the second session; wherein, the service of the second session is the same as the service of the first session, and/or, The application to which the second session belongs is the same as the application to which the first session belongs.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the network slice to which the first session requests access.
  • the actual traffic rate is determined according to the actual traffic on the N6 interface in the target network area.
  • the actual traffic rate is determined based on the average bandwidth used by the terminals in the target network area and the performance statistics of the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network area.
  • the transceiver module 1040 is specifically configured to: receive a second message from a data analysis network element, the second message carrying the actual traffic rate and the upper limit traffic rate of the target network area; or For the third message of the data storage network element, the third message carries the actual traffic rate and the upper limit traffic rate of the target network area; or, when the target network area is the entire coverage area of the target network slice, receive the entire target network slice.
  • the fourth message of each policy control network element in the coverage area The fourth message carries the actual traffic rate of the policy control network element in its own service area; the actual traffic rate in each service area is summarized to obtain the actual traffic rate of the target network area.
  • the target network area is a local area in the target network slice
  • the transceiver module 1040 is specifically configured to: send the maximum bit rate of the authorized session set of the non-guaranteed bit rate service in the first session to the session management network element corresponding to the first session, and, The authorized maximum bit rate of the guaranteed bit rate service in one session; and the maximum bit rate of the authorized session set of the non-guaranteed bit rate service in the first session is sent to the terminal corresponding to the first session.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • the network device of the embodiment shown in FIG. 10 can be used to execute the technical solution executed by the PCF in the above method embodiment.
  • the network device may be PCF can also be a component of PCF (such as a chip or circuit).
  • FIG. 11 is a schematic structural diagram of a network device provided by an embodiment of this application. As shown in FIG. 11, the network device 1100 may include: a processing module 1120 and a transceiver module 1140.
  • the transceiver module 1140 is configured to receive the authorized flow rate from the policy control network element; wherein, the authorized flow rate is used to indicate the maximum flow rate allowed for the first session, and the authorized flow rate is based on the target network
  • the actual traffic rate of the target network area in the slice and the upper limit traffic rate are determined; the actual traffic rate is used to indicate the sum of traffic rates occupied by all sessions that the network slice has accessed in the target network area;
  • the processing module 1120 is configured to perform flow control on the first session based on the authorized flow rate.
  • the first session includes a guaranteed bit rate service, and/or a non-guaranteed bit rate service.
  • the first session includes a guaranteed bit rate service and/or a non-guaranteed bit rate service.
  • the authorized traffic rate is used to indicate the upper limit of the sum of the traffic rates of all guaranteed bit rate services and non-guaranteed bit rate services included in the first session, or the authorized traffic rate is used to indicate all traffic rates included in the first session.
  • the upper limit of the sum of traffic rates of guaranteed bit rate services, or the authorized traffic rate is used to indicate the upper limit of the sum of traffic rates of all non-guaranteed bit rate services included in the first session.
  • the authorized flow rate is the subscription of the first session Maximum flow rate.
  • the first A flow rate is less than the upper limit flow rate; or, when the actual flow rate is greater than or equal to the first flow rate and less than the upper limit flow rate; or, when the actual flow rate is greater than or equal to the upper limit flow rate
  • the ratio between the rates is greater than the preset first threshold, and the ratio is less than 1; or, when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to the preset first threshold, and When the ratio is less than 1, the authorized traffic rate is determined according to the contracted maximum traffic rate of the first session; wherein the authorized traffic rate is less than the contracted maximum traffic rate.
  • the authorized traffic rate is: the contracted minimum traffic rate of the first session or the target network slice rate The minimum value of the maximum bit rate of the set of subscribed terminals.
  • the second subscription traffic rate is used to limit the minimum traffic rate and/or the maximum traffic rate of the first session related to the first application in the target network area, and the second subscription traffic rate Indicate the minimum traffic rate required for the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate;
  • the second subscription traffic rate comes from the application function network element, and the second The contracted traffic rate is determined according to the first contracted traffic rate and the actual traffic rate, and the first contracted traffic rate comes from a data management network element or a data storage network element.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the network slice to which the first session requests access.
  • the actual traffic rate is determined according to the actual traffic on the N6 interface in the target network area.
  • the actual traffic rate is determined according to the performance statistics of the average bandwidth used by the terminals in the target network area and the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • the authorized traffic rate is used to control the upstream traffic and/or the downstream traffic of the target network area.
  • the processing module 1120 is specifically configured to: control the user plane network element to allocate a quality service flow for the first session;
  • the maximum flow rate determines the maximum flow rate of the first session; when the maximum flow rate of the first session is greater than the authorized flow rate, modify the maximum flow rate of the newly allocated quality service flow, and/or modify The maximum flow rate of the currently allocated quality service flow of the first session.
  • the first session includes a guaranteed bit rate quality service flow, and/or a non-guaranteed bit rate quality service flow; the processing module 1120 is specifically used for one or more of the following : Modify the maximum flow rate of the newly allocated guaranteed bit rate quality service flow; modify the maximum flow rate of the currently allocated guaranteed bit rate quality service flow of the first session; modify the non-guaranteed bit rate quality service flow of the first session The maximum flow rate.
  • control network element is a terminal corresponding to the first session
  • processing module 1120 is specifically configured to: based on the authorized traffic rate, perform the uplink of the first session Flow rate for flow control.
  • the network device of the embodiment shown in FIG. 11 can be used to execute the technical solution executed by the control network element (terminal or SMF) in the above method embodiment.
  • the network device may be an SMF, or a component (such as a chip or a circuit) of the SMF.
  • the network device may be a UE, or a component of the UE (for example, a chip or a circuit).
  • FIG. 12 is a schematic structural diagram of a network device provided by an embodiment of this application. As shown in FIG. 12, the network device 1200 may include: a processing module 1220 and a transceiver module 1240.
  • the processing module 1220 is configured to obtain the actual traffic rate of the target network area in the target network slice, and the actual traffic rate is used to indicate the traffic rate occupied by all sessions that the network slice has accessed in the target network area. The sum; the processing module 1220 is further configured to determine a second application information parameter according to the upper limit flow rate of the target network area and the actual flow rate; the second application information parameter is used to provide the first service The bandwidth requirement and service priority of an application are described; the transceiver module 1240 is used to send adjusted application information parameters to the policy control network element.
  • the second application information parameter includes: one of the bandwidth requirement parameter of the application session, the bandwidth requirement parameter of the application service flow, the service priority, and the preemption order parameter under the same priority Or multiple; wherein the bandwidth requirement parameter of the application service flow includes: a second subscription flow rate, and the second subscription flow rate is used to limit the first session related to the first application in the target network area
  • the minimum traffic rate and/or the maximum traffic rate, and the second subscription traffic rate indicates the minimum traffic rate required by the first session related to the first application to ensure service quality, and/or the maximum traffic rate that the service may generate.
  • the processing module 1220 is specifically configured to: when the ratio between the actual flow rate and the upper limit flow rate is greater than or equal to a preset threshold, apply information to the first application information The parameters are adjusted to obtain the second application information parameter.
  • the processing module 1220 is specifically used for one or more of the following: reducing the bandwidth requirement parameter of an application session; reducing the bandwidth requirement parameter of an application service flow; reducing the service priority of the application; Adjust the preemption sequence of multiple application services with the same priority; modify the willingness to be preempted for some application sessions.
  • the target network area is the entire coverage area or a partial area of the target network slice; wherein, the target network slice is the network slice to which the first session requests access.
  • the actual traffic rate is determined according to the actual traffic on the N6 interface in the target network area.
  • the actual traffic rate is determined according to the performance statistics of the average bandwidth used by the terminals in the target network area and the number of terminals.
  • the actual traffic rate is determined according to the actual traffic bandwidth of the access network device in the target network area in the target network slice.
  • the transceiver module 1240 is specifically configured to: send a sixth message to the policy control network element; receive a seventh message from the policy control network element, where the seventh message carries The actual flow rate.
  • the sixth message is used to request the policy control network element to feed back the actual traffic rate of the target network area, or the sixth message is used to request the policy The control network element periodically feeds back the actual traffic rate of the target network area, or the sixth message is used to request the policy control network element to feed back the actual traffic rate of the target network area when a preset condition is met. Flow rate.
  • the seventh message also carries the upper limit flow rate.
  • the network device of the embodiment shown in FIG. 12 can be used to execute the technical solution executed by the AF in the above method embodiment.
  • the network device may be AF can also be a component of AF (such as a chip or circuit).
  • the division of the various modules in the network devices shown in FIG. 10 to FIG. 12 is only a division of logical functions, and may be fully or partially integrated into one physical entity in actual implementation, or may be physically separated.
  • these modules can all be implemented in the form of software called by processing elements; they can also be implemented in the form of hardware; part of the modules can be implemented in the form of software called by the processing elements, and some of the modules can be implemented in the form of hardware.
  • the processing module can be a separate processing element, or it can be integrated in a network device, such as a certain chip of the PCF.
  • it can also be stored in the memory of the network device in the form of a program. The processing element calls and executes the functions of the above modules.
  • each step of the above method or each of the above modules can be completed by an integrated logic circuit of hardware in the processor element or instructions in the form of software.
  • the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more application specific integrated circuits (ASIC), or one or more microprocessors (digital singnal processor, DSP), or, one or more field programmable gate arrays (FPGA), etc.
  • ASIC application specific integrated circuits
  • DSP digital singnal processor
  • FPGA field programmable gate arrays
  • the processing element may be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • CPU central processing unit
  • these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • the embodiments of the present application also provide a computer-readable storage medium in which a computer program is stored, which when running on a computer, causes the computer to execute the communication method described in the above-mentioned embodiments.
  • embodiments of the present application also provide a computer program product, which includes a computer program, which when running on a computer, causes the computer to execute the communication method described in the foregoing embodiment.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium, (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种流量控制方法、网络设备与通信***,其中,PCF能够获取目标网络切片中目标网络区域的实际流量速率,实际流量速率用于指示网络切片在目标网络区域中已接入的所有会话占用的流量速率之和,从而,根据目标网络区域的上限流量速率与实际流量速率,确定第一会话的授权流量速率,授权流量速率用于指示第一会话允许的最大流量速率,进而,向第一会话的控制网元发送授权流量速率。因此,本申请所提供的的技术方案能够基于网络切片中目标网络区域的实际流量速率与上限流量速率,实现对第一会话的授权流量速率的控制,避免加入第一会话后,目标网络区域的流量超出其允许的最大流量速率,保障目标网络区域的安全性与稳定性。

Description

流量控制方法、网络设备与通信***
本申请要求于2020年4月27日提交中国专利局、申请号为202010345637.X、申请名称为“流量控制方法、网络设备与通信***”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,特别涉及一种流量控制方法、网络设备与通信***。
背景技术
网络切片(network slice)是在运营商的通信网络中划分出来的一个具备特定网络特性的逻辑网络,是满足第三代合作伙伴项目(3rd generation partnership project,3GPP)提出的第五代(5th generation,5G)移动通信技术关于网络差异化需求的关键技术。物理网络可以被抽象划分成多个网络切片,每个网络切片构成一个端到端的逻辑网络,彼此之间逻辑上是隔离的。
网络切片资源并非是无限的。因此,在网络切片的运行过程中,需要对网络切片中各分组数据单元会话(oacket data unit session,PDU Session)所使用的网络带宽进行限制和控制,以保证网络切片能够正常运行。如何实现对网络切片的流量控制,就成为本领域技术人员面对的重要技术问题。
发明内容
本申请提供了一种流量控制方法、网络设备与通信***,用以对新接入的第一会话的授权流量速率进行限制,以实现对网络切片的流量速率控制,降低了网络切片超负荷运行的危险性,有利于提高网络切片的安全性与稳定性。
第一方面,本申请实施例提供一种流量控制方法,应用于策略控制网元,包括:获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第一会话的授权流量速率,所述授权流量速率用于指示所述第一会话允许的最大流量速率;向所述第一会话的控制网元发送所述授权流量速率。
如此,本方案通过获取目标网络区域的实际流量速率,并结合上限流量速率,实现对第一会话的授权流量速率的确定,从而,控制网元能够基于第一会话的授权流量速率对第一会话的各类型业务分别实现流量控制,也从整体上控制了整个目标网络区域的流量使用情况,能够降低网络切片超负荷运行的危险性,有利于提高网络切片的安全性与稳定性。
在第一方面的一种可能的实施例中,所述确定第一会话的授权流量速率之前,所述方 法还包括:接收第一消息,所述第一消息用于请求建立所述第一会话或用于请求修改所述第一会话。
在第一方面的另一种可能的实施例中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在第一方面的另一种可能的实施例中,所述确定第一会话的授权流量速率,包括:当所述实际流量速率小于所述上限流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率;或者,当所述实际流量速率小于或等于第一流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率,其中,所述第一流量速率小于消息上限流量速率;或者,当所述实际流量速率小于所述第一流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值小于或等于预设的第一阈值时,将所述第一会话的签约最大流量速率确定为所述授权流量速率,其中,所述第一阈值小于1;或者,当所述实际流量速率与所述上限流量速率之间的比值小于所述第一阈值时,将所述第一会话的签约最大流量速率确定为所述授权流量速率。
在第一方面的另一种可能的实施例中,所述确定第一会话的授权流量速率,包括:当所述实际流量速率小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率,所述第一流量速率小于所述上限流量速率;或者,当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率。
在第一方面的另一种可能的实施例中,所述确定第一会话的授权流量速率,包括:当所述实际流量速率大于或等于所述上限流量速率时,将所述第一会话的签约最小流量速率,确定为所述授权流量速率,或者,将所述目标网络切片的签约终端集合最大比特速率的最小值,确定为所述授权终端集合最大比特速率。
在第一方面的另一种可能的实施例中,所述方法还包括:接收来自于应用功能网元的第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述 目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定。
在第一方面的另一种可能的实施例中,当所述实际流量速率大于或等于所述上限流量速率时,所述方法还包括如下一种或多种:拒绝为所述第一会话分配所述授权流量速率;在所述目标网络区域中,释放非保障比特速率业务的业务质量数据流;释放所述目标网络区域中的低优先级会话;修改所述第一会话的业务质量参数,所述业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
在第一方面的另一种可能的实施例中,所述方法还包括:向第二会话的控制网元发送所述授权流量速率;其中,所述第二会话的业务与所述第一会话的业务相同,和/或,所述第二会话所属应用与所述第一会话所属应用相同。
在第一方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第一方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第一方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第一方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络区域中的实际流量带宽确定。
在第一方面的另一种可能的实施例中,所述获取目标网络切片中目标网络区域的实际流量速率,包括:接收来自于数据分析网元的第二消息,所述第二消息携带所述目标网络区域的所述实际流量速率与所述上限流量速率;或者,接收来自于数据存储网元的第三消息,所述第三消息携带所述目标网络区域的所述实际流量速率与所述上限流量速率;或者,当所述目标网络区域为所述目标网络切片的整个覆盖区域时,接收来自于所述目标网络切片的整个覆盖区域中各策略控制网元的第四消息,所述第四消息携带所述策略控制网元在自身服务区域内的实际流量速率;并对各服务区域内的实际流量速率进行汇总,得到所述目标网络区域的实际流量速率;或者,当所述目标网络区域为所述目标网络切片中的局部区域时,接收来自于所述目标网络切片中的局部区域中的各接入和移动管理网元的第五消息,所述第五消息携带所述接入和移动管理网元在自身服务区域中,各接入网设备在所述目标网络切片中的实际流量带宽;并对各第五消息中的实际流量带宽进行汇总,得到所述目标网络区域的实际流量速率。
在第一方面的另一种可能的实施例中,所述向所述第一会话的控制网元发送所述授权流量速率,包括:向所述第一会话对应的会话管理网元发送所述第一会话中的非保障比特速率业务的授权会话集合最大比特速率,以及,所述第一会话中的保障比特速率业务的授权最大比特速率;向所述第一会话对应的终端发送所述第一会话中的非保障比特速率业务的授权会话集合最大比特速率。
在第一方面的另一种可能的实施例中,所述授权流量速率用于对所述目标网络区域的上行流量和/或下行流量进行控制。
第二方面,本申请提供了一种流量控制方法,执行于控制网元,包括:接收来自于策 略控制网元的授权流量速率;其中,所述授权流量速率用于指示第一会话允许的最大流量速率,所述授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的;所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;基于所述授权流量速率,对所述第一会话进行流量控制。如此,控制网元依据策略控制网元确定的授权流量速率,对第一会话的各类型业务分别进行流量控制,这有利于降低网络切片超负荷运行的危险性,有利于提高网络切片的安全性与稳定性。
在第二方面的一种可能的实施例中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在第二方面的另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当所述实际流量速率小于或等于第一流量速率时,其中,所述第一流量速率小于消息上限流量速率;或者,当所述实际流量速率小于所述第一流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值小于或等于预设的第一阈值时,其中,所述第一阈值小于1;或者,当所述实际流量速率与所述上限流量速率之间的比值小于所述第一阈值时,所述授权流量速率为所述第一会话的签约最大流量速率。
在第二方面的另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,所述第一流量速率小于所述上限流量速率;或者,当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,所述授权流量速率根据所述第一会话的签约最大流量速率确定;其中,所述授权流量速率小于所述签约最大流量速率。
在第二方面的另一种可能的实施例中,当所述实际流量速率大于或等于所述上限流量速率时,所述授权流量速率为:所述第一会话的签约最小流量速率或者所述目标网络切片的签约终端集合最大比特速率的最小值。
在第二方面的另一种可能的实施例中,第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;所述第二签约流量速率来自于应用功能网元,所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定。
在第二方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第二方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第二方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第二方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在第二方面的另一种可能的实施例中,所述授权流量速率用于对所述目标网络区域的上行流量和/或下行流量进行控制。
在第二方面的另一种可能的实施例中,所述控制网元为会话管理网元,所述基于所述授权流量速率,对所述第一会话进行流量控制,包括:控制用户面网元为所述第一会话分配质量业务流;基于所述第一会话的已经分配的质量业务流的最大流量速率,确定所述第一会话的最大流量速率;当所述第一会话的最大流量速率大于所述授权流量速率时,修改新分配的质量业务流的最大流量速率,和/或,修改所述第一会话的当前已分配的质量业务流的最大流量速率。
在第二方面的另一种可能的实施例中,所述第一会话包括保障比特速率质量业务流,和/或,非保障比特速率质量业务流;所述基于所述授权流量速率,对所述第一会话进行流量控制,包括如下一种或多种:修改新分配的保障比特速率质量业务流的最大流量速率;修改所述第一会话的当前已分配的保障比特速率质量业务流的最大流量速率;修改第一会话的非保障比特速率质量业务流的最大流量速率。
在第二方面的另一种可能的实施例中,所述控制网元为所述第一会话对应的终端,所述基于所述授权流量速率,对所述第一会话进行流量控制,包括:基于所述授权流量速率,对所述第一会话的上行流量速率进行流量控制。
第三方面,本申请提供了一种流量控制方法,应用于应用功能网元,包括:获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数;所述第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述;向策略控制网元发送调整后的应用信息参数。如此,应用功能网元能够基于目标网络区域的实际流量速率与上限流量速率,对第一应用的带宽需求与业务优先级进行确定,从而,网络侧网元也可以据此实现对目标网络区域的签约流量速率或授权流量速率的确定,进而,也能够实现对目标网络区域的流量控制。
在第三方面的一种可能的实施例中,所述第二应用信息参数,包括:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种;其中,所述应用业务流的带宽需求参数包括:第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率。
在第三方面的另一种可能的实施例中,所述根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数,包括:当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的阈值时,对第一应用信息参数进行调整,得到所述第二应用信息参数。
在第三方面的另一种可能的实施例中,所述对第一应用信息参数进行调整,包括如下一种或多种:降低应用会话的带宽需求参数;降低应用业务流的带宽需求参数;降低应用的业务优先级;
调整处于相同优先级的多个应用业务的抢占顺序;修改部分应用会话的被抢占意愿。
在第三方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第三方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第三方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第三方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在第三方面的另一种可能的实施例中,所述获取目标网络切片中目标网络区域的实际流量速率,包括:向所述策略控制网元发送第六消息;接收来自于策略控制网元的第七消息,所述第七消息携带所述实际流量速率。
在第三方面的另一种可能的实施例中,所述第六消息用于请求所述策略控制网元反馈所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元周期性反馈所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元在满足预设条件时反馈所述目标网络区域的所述实际流量速率。
在第三方面的另一种可能的实施例中,所述第七消息还携带所述上限流量速率。
第四方面,本申请提供了一种网络设备,包括:处理模块与收发模块;其中,所述收发模块,用于获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;所述处理模块,用于根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第一会话的授权流量速率,所述授权流量速率用于指示所述第一会话允许的最大流量速率;所述收发模块,还用于向所述第一会话的控制网元发送所述授权流量速率。如此,本方案通过获取目标网络区域的实际流量速率,并结合上限流量速率,实现对第一会话的授权流量速率的确定,从而,控制网元能够基于第一会话的授权流量速率对第一会话的各类型业务分别实现流量控制,也从整体上控制了整个目标网络区域的流量使用情况,能够降低网络切片超负荷运行的危险性,有利于提高网络切片的安全性与稳定性。
在第四方面的一种可能的实施例中,所述处理模块还用于:接收第一消息,所述第一消息用于请求建立所述第一会话或用于请求修改所述第一会话。
在第四方面的另一种可能的实施例中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在第四方面的另一种可能的实施例中,所述处理模块,具体用于:当所述实际流量速率小于所述上限流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率;或者,当所述实际流量速率小于或等于第一流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率,其中,所述第一流量速率小于消息上限流量速率;或者,当所述实际流量速率小于所述第一流量速率时,将所述第一会话的签约最大流量速率确定为所述授权流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值小于或等于预设的第一阈值时,将所述第一会话的签约最大流量速率确定为所述授权流量速率,其中,所述第一阈值小于1;或者,当所述实际流量速率与所述上限流量速率之间的比值小于所述第一阈值时,将所述第一会话的签约最大流量速率确定为所述授权流量速率。
在第四方面的另一种可能的实施例中,所述处理模块,具体用于:当所述实际流量速率小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率,所述第一流量速率小于所述上限流量速率;或者,当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率;或者,当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述授权流量速率小于所述签约最大流量速率。
在第四方面的另一种可能的实施例中,所述处理模块,具体用于:当所述实际流量速率大于或等于所述上限流量速率时,将所述第一会话的签约最小流量速率,确定为所述授权流量速率,或者,将所述目标网络切片的签约终端集合最大比特速率的最小值,确定为所述授权终端集合最大比特速率。
在第四方面的另一种可能的实施例中,所述收发模块,还用于:接收来自于应用功能网元的第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定。
在第四方面的另一种可能的实施例中,当所述实际流量速率大于或等于所述上限流量速率时,所述处理模块,还用于如下一种或多种:拒绝为所述第一会话分配所述授权流量速率;在所述目标网络区域中,释放非保障比特速率业务的业务质量数据流;释放所述目标网络区域中的低优先级会话;修改所述第一会话的业务质量参数,所述业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
在第四方面的另一种可能的实施例中,所述收发模块,还用于:向第二会话的控制网元发送所述授权流量速率;其中,所述第二会话的业务与所述第一会话的业务相同,和/或,所述第二会话所属应用与所述第一会话所属应用相同。
在第四方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第四方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第四方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第四方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络区域中的实际流量带宽确定。
在第四方面的另一种可能的实施例中,所述收发模块,具体用于:接收来自于数据分析网元的第二消息,所述第二消息携带所述目标网络区域的所述实际流量速率与所述上限流量速率;或者,接收来自于数据存储网元的第三消息,所述第三消息携带所述目标网络区域的所述实际流量速率与所述上限流量速率;或者,当所述目标网络区域为所述目标网络切片的整个覆盖区域时,接收来自于所述目标网络切片的整个覆盖区域中各策略控制网元的第四消息,所述第四消息携带所述策略控制网元在自身服务区域内的实际流量速率;并对各服务区域内的实际流量速率进行汇总,得到所述目标网络区域的实际流量速率;或者,当所述目标网络区域为所述目标网络切片中的局部区域时,接收来自于所述目标网络切片中的局部区域中的各接入和移动管理网元的第五消息,所述第五消息携带所述接入和移动管理网元在自身服务区域中,各接入网设备在所述目标网络切片中的实际流量带宽;并对各第五消息中的实际流量带宽进行汇总,得到所述目标网络区域的实际流量速率。
在第四方面的另一种可能的实施例中,所述收发模块,具体用于:向所述第一会话对应的会话管理网元发送所述第一会话中的非保障比特速率业务的授权会话集合最大比特速率,以及,所述第一会话中的保障比特速率业务的授权最大比特速率;向所述第一会话对应的终端发送所述第一会话中的非保障比特速率业务的授权会话集合最大比特速率。
在第四方面的另一种可能的实施例中,所述授权流量速率用于对所述目标网络区域的上行流量和/或下行流量进行控制。
第五方面,本申请提供了一种网络设备,包括:收发模块与处理模块;其中,所述收模块,用于接收来自于策略控制网元的授权流量速率;其中,所述授权流量速率用于指示第一会话允许的最大流量速率,所述授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的;所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;所述处理模块,用于基于所述授权流量速率,对所述第一会话进行流量控制。如此,控制网元依据策略控制网元确定的授权流量速率,对第一会话的各类型业务分别进行流量控制,这有利于降低网络切片超负荷运行的危险性,有利于提高网络切片的安全性与稳定性。
在第五方面的一种可能的实施例中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在第五方面的另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当所述实际流量速率小于或等于第一流量速率时,其中,所述第一流量速率小于消息上限流量速率;或者,当所述实际流量速率小于所述第一流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值小于或等于预设的第一阈值时,其中,所述第一阈值小于1;或者,当所述实际流量速率与所述上限流量速率之间的比值小于所述第一阈值时,所述授权流量速率为所述第一会话的签约最大流量速率。
在第五方面的另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,所述第一流量速率小于所述上限流量速率;或者,当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,所述授权流量速率根据所述第一会话的签约最大流量速率确定;其中,所述授权流量速率小于所述签约最大流量速率。
在第五方面的另一种可能的实施例中,当所述实际流量速率大于或等于所述上限流量速率时,所述授权流量速率为:所述第一会话的签约最小流量速率或者所述目标网络切片的签约终端集合最大比特速率的最小值。
在第五方面的另一种可能的实施例中,第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;所述第二签约流量速率来自于应用功能网元,所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定,所述第一签约流量速率来自于数据管理网元或数据存储网元。
在第五方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第五方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第五方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第五方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在第五方面的另一种可能的实施例中,所述授权流量速率用于对所述目标网络区域的上行流量和/或下行流量进行控制。
在第五方面的另一种可能的实施例中,所述处理模块,具体用于:控制用户面网元为所述第一会话分配质量业务流;基于所述第一会话的已经分配的质量业务流的最大流量速率,确定所述第一会话的最大流量速率;当所述第一会话的最大流量速率大于所述授权流量速率时,修改新分配的质量业务流的最大流量速率,和/或,修改所述第一会话的当前已分配的质量业务流的最大流量速率。
在第五方面的另一种可能的实施例中,所述第一会话包括保障比特速率质量业务流, 和/或,非保障比特速率质量业务流;所述处理模块,具体用于如下一种或多种:修改新分配的保障比特速率质量业务流的最大流量速率;修改所述第一会话的当前已分配的保障比特速率质量业务流的最大流量速率;修改第一会话的非保障比特速率质量业务流的最大流量速率。
在第五方面的另一种可能的实施例中,所述控制网元为所述第一会话对应的终端,所述处理模块,具体用于:基于所述授权流量速率,对所述第一会话的上行流量速率进行流量控制。
第六方面,本申请提供了一种网络设备,包括:处理模块与收发模块;其中,所述处理模块,用于获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;所述处理模块,还用于根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数;所述第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述;所述收发模块,用于向策略控制网元发送调整后的应用信息参数。如此,应用功能网元能够基于目标网络区域的实际流量速率与上限流量速率,对第一应用的带宽需求与业务优先级进行确定,从而,网络侧网元也可以据此实现对目标网络区域的签约流量速率或授权流量速率的确定,进而,也能够实现对目标网络区域的流量控制。
在第六方面的一种可能的实施例中,所述第二应用信息参数,包括:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种;其中,所述应用业务流的带宽需求参数包括:第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率。
在第六方面的另一种可能的实施例中,所述处理模块,具体用于:当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的阈值时,对第一应用信息参数进行调整,得到所述第二应用信息参数。
在第六方面的另一种可能的实施例中,所述处理模块,具体用于如下一种或多种:降低应用会话的带宽需求参数;降低应用业务流的带宽需求参数;降低应用的业务优先级;调整处于相同优先级的多个应用业务的抢占顺序;修改部分应用会话的被抢占意愿。
在第六方面的另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在第六方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在第六方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在第六方面的另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在第六方面的另一种可能的实施例中,具体用于:向所述策略控制网元发送第六消息;接收来自于策略控制网元的第七消息,所述第七消息携带所述实际流量速率。
在第六方面的另一种可能的实施例中,所述第六消息用于请求所述策略控制网元反馈 所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元周期性反馈所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元在满足预设条件时反馈所述目标网络区域的所述实际流量速率。
在第六方面的另一种可能的实施例中,所述第七消息还携带所述上限流量速率。
第七方面,本申请提供了一种网络设备,包括:至少一个处理器和存储器;所述存储器存储计算机执行指令;所述至少一个处理器执行所述存储器存储的计算机执行指令,使得所述至少一个处理器执行如第一方面、第二方面或第三方面中任意一种实施例所述的方法。
第八方面,本申请提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当其在计算机上运行时,使得计算机执行如第一方面、第二方面或第三方面中任意一种实施例所述的方法。
第九方面,本申请提供一种计算机程序,当所述计算机程序被计算机执行时,用于执行如第一方面、第二方面或第三方面中任意一种实施例所述的方法。
在一种可能的设计中,第九方面中的程序可以全部或者部分存储在与处理器封装在一起的存储介质上,也可以部分或者全部存储在不与处理器封装在一起的存储器上。
第十方面,本申请实施例还提供一种通信***,包括:策略控制网元,用于执行如第一方面的任意一种实施例所述的方法;控制网元,用于执行如第二方面的任意一种实施例所述的方法。
在一种可能的设计中,所述通信***还包括:应用功能网元,用于执行如第三方面的任意一种实施例所述的方法。
在另一种可能的设计中,所述控制网元为会话管理网元;或者,所述控制网元为所述会话管理网元或第一会话对应的终端。
综上,本申请实施例提供一种流量控制方法、网络设备与通信***,能够基于网络切片中目标网络区域的实际流量速率与上限流量速率,实现对第一会话的授权流量速率的控制,避免加入第一会话后,目标网络区域的流量超出其允许的最大流量速率,保障目标网络区域的安全性与稳定性。
附图说明
图1为本申请实施例提供的一种通信***的示意图;
图2为本申请实施例提供的一种通信***的架构示意图;
图3为现有技术中的一种流量速率的控制方法的流程示意图;
图4为本申请实施例提供的一种流量控制方法的流程示意图;
图5为本申请实施例提供的另一种流量控制方法的流程示意图;
图6为本申请实施例提供的一种流量控制方法的信息交互示意图;
图7为本申请实施例提供的另一种流量控制方法的信息交互示意图;
图8为本申请实施例提供的另一种流量控制方法的信息交互示意图;
图9为本申请实施例提供的一种网络设备的实体结构示意图;
图10为本申请实施例提供的一种网络设备的结构示意图;
图11为本申请实施例提供的另一种网络设备的结构示意图;
图12为本申请实施例提供的另一种网络设备的结构示意图。
具体实施方式
以下,结合附图对本实施例的实施方式进行详细描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
首先,对本申请实施例所应用的通信***进行说明。
本申请实施例应用于包含有多个网络切片的无线通信***。示意性的,可以参考图1所示的通信***100的示意图,如图1所示,该无线网络通信***100从逻辑上被抽象划分为多个网络切片,图1示出了3个网络切片,分别为:网络切片1~网络切片3。应当理解,网络切片是一种逻辑划分得到的,多个网络切片之间可能存在区域交叠的情况,例如,图1中的3个网络切片之间即存在区域交叠情况。
对于图1中的任意一个网络切片,都构成一个端到端的逻辑网络,不同网络切片之间的逻辑彼此隔离。每个网络切片都可以为终端提供一种或多种网络服务,不同网络切片之间所提供的网络服务也互不干扰和影响。通常情况下,不同网络切片的网络特征和性能要求并不相同。
目前,网络切片的类型有如下几种:增强的移动宽带(enhanced mobile broadband,eMBB)、超低时延超高可靠性通信(ultra-reliable and low-latency communication,URLLC)和海量物联网(massive internet of things,MIoT)。应当理解,随着技术的进步,本方案也可以适用于随着技术发展而可能出现的其他类型的网络切片。
请参考图2,图2示出了通信***的架构示意图。示意性的,图2仅示出了一个网络切片1。具体的,如图2所示,该通信***包括:终端(或称为终端设备)、接入网(access network,AN)设备、接入管理网元、会话管理网元、用户面网元、策略控制网元、网络切片选择网元、网络仓库功能网元、网络数据分析网元、统一数据管理网元、统一数据存储网元、连接运营商网络的数据网络(data network,DN)网元。
在这些网元中,网络切片选择网元、网络仓库功能网元、网络数据分析网元、统一数据管理网元、统一数据存储网元、接入管理网元在多个网络切片中共享。会话管理网元和用户面网元一般属于特定的网络切片。而策略控制网元可以在多个网络切片之间共享,或者,也可以属于特定的网络切片。接入网设备一般在多个网络切片之间共享。
在图2所示出的通信***100中,虚线用于标识各网元(或设备)之间的用户面连接,实线用于标识各网元(或设备)之间的控制面连接。
现对图2中各网元进行具体说明。
终端:也可以称为用户设备(user equipment,UE)、移动台和远方站等,是一种具有无线收发功能的网络设备,终端可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。本申请实施例中,终端可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终 端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等,不作穷举。本申请的实施例对终端所采用的具体技术、设备形态以及名称不做限定。
接入网设备:用于终端的无线侧接入,为终端接入无线网络提供接入服务。接入网设备可能的部署形态包括:集中式单元(centralized unit,CU)和分布式单元
(distributed unit,DU)的分离场景以及单站点场景。
其中,在分离场景中,CU支持无线资源控制(radio resource control,RRC)、分组数据汇聚协议(packet data convergence protocol,PDCP)、业务数据适配协议(service data adaptation protocol,SDAP)等协议;DU主要支持无线链路控制层(radio link control,RLC)、媒体接入控制层(media access control,MAC)和物理层协议。
在单站点场景中,单站点可以包括无线基站(new radio Node,gNB)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站、基带单元(base band unit,BBU)中的一种或多种。
在图2所示的通信***100中,具体示出了2个接入网设备:gNB-A和gNB-B。实际的通信场景中,在一个网络切片的整个服务区域内,可以有一个或多个gNB(通常为多个)。每个gNB具备一定的覆盖区域,在其覆盖区域内,可以有一个或多个小区(Cell),每个小区有唯一的全球小区标识(global cell identifier,GCI)。
接入管理网元:主要用于移动网络中的终端的附着、移动性管理、跟踪区更新流程,接入管理网元终结了非接入层(non access stratum,NAS)消息、完成注册管理、连接管理以及可达性管理、分配跟踪区域列表(track area list,TA list)以及移动性管理等,并且透明路由会话管理(session management,SM)消息到会话管理网元。
在第5代(5th generation,5G)通信***中,接入管理网元可以是接入与移动性管理功能(access and mobility management function,AMF)网元。后续为便于说明,直接以AMF指代接入管理网元。
会话管理网元:主要用于移动网络中的会话管理,如会话建立、修改、释放。具体功能如为终端分配互联网协议(internet protocol,IP)地址、选择提供报文转发功能的用户面网元等。在5G通信***中,会话管理网元可以是会话管理功能(session management function,SMF)。后续为便于说明,直接以SMF指代会话管理网元。
用户面网元:也可以称为协议数据单元(protocol data unit,PDU)、会话锚点(PDU session anchor,PSA),主要负责对用户报文进行处理,如转发、计费、合法监听等。在5G通信***中,用户面网元可以是用户面功能(user plane function,UPF)。后续为便于说明,直接以UPF指代用户面网元。
策略控制网元:包含用户签约数据管理功能、策略控制功能、计费策略控制功能、服务质量(quality of service,QoS)控制等。在5G通信***中,策略控制网元可以是策略控制功能(policy control function,PCF)。后续为便于说明,直接以PCF指代策略控制网元。
需要注意的是,在实际通信网络中,PCF还可以按照层次或按功能分为多个实体。例 如,在一个通信***中,可以包括:全局PCF和多个切片内PCF,每个切片内PCF用于在所属网络切片内实现策略控制功能。又例如,按照功能划分,PCF还可以由会话管理PCF(session management PCF,SM-PCF)和接入管理PCF(access management PCF,AM-PCF)构成,此时,PCF包括2个实体。
网络切片选择网元:主要用于为终端的业务选择合适的网络切片。在5G通信***中,网络切片选择网元可以是网络切片选择功能(network slice selection function,NSSF)网元。后续为便于说明,直接以NSSF指代网络切片选择网元。
数据网络网元:用于为终端提供数据传输服务。具体而言,DN可以是公用数据网(public data network,PDN)网络的网元,如因特网(internet)等,也可以是本地接入数据网络(local access data network,LADN)的网元,如移动边缘计算(mobile edge computing,MEC)节点的网络等。
网络数据分析网元:可用于从各个网络功能(network function,NF),例如策略控制网元、会话管理网元、用户面网元、接入管理网元、应用功能网元(通过网络能力开放功能网元)收集数据,并进行分析和预测。在5G通信***中,网络数据分析网元可以是网络数据分析功能(network data analytics function,NWDAF)。后续为便于说明,直接以NWDAF指代网络数据分析网元。
统一数据管理网元:用于管理终端的签约信息。在5G通信***中,统一数据管理网元可以是统一数据管理(unified data management,UDM)。后续为便于说明,直接以UDM指代统一数据管理网元(或简称为:数据管理网元)。
统一数据存储网元:用于存储结构化的数据信息,其中包括签约信息,策略信息,以及有标准格式定义的网络数据或业务数据。在5G通信***中,统一数据存储网元可以是统一数据存储(unified data repository,UDR)。后续为便于说明,直接以UDR指代统一数据存储网元(或简称为:数据存储网元)。
实际网络场景中,UDM与UDR可以由同一个网络实体实现,也即,二者可以为同一个网络实体。
网络仓库功能网元:在5G通信***中,网络仓库功能网元可以是网络仓库功能(network repository function,NRF)。
在如图1或图2所示的通信***中,可以基于终端业务请求中携带的网络切片的标识为业务选择网络切片,并利用所选择的网络切片传输业务数据。
网络切片的标识(或称为:标识信息)可以包括但不限于:网络切片选择辅助信息(network slice selection assistance information,NSSAI)。具体而言,可以利用单个网络切片选择辅助信息(single Network slice selection assistance information,S-NSSAI)对单个网络切片进行标识,而NSSAI则可用于标识一组网络切片(或称为:网络切片组)。其中,一个网络切片组可以包括一个或多个网络切片。
例如,运营商或其他用户可以基于业务需求而订购、创建网络切片,网络切片也需要满足一定的服务等级协议(service Level agreement,SLA)。SLA中包含有网络切片的服务等级规格(service level specification,SLS),SLS能够用于确定网络切片的规模。不同网络切片的SLS可以不同。
可以利用网络切片的最大流量速率来表征网络切片的规模。网络切片的最大流量速率, 即为所有通过网络切片传输的业务所允许使用的最大流量速率的总和,也就是接入到这个网络切片的所有PDU会话(packet data unit session)传输的业务所使用的网络速率总和的最大值。
网络切片的最大流量速率一般还区分上行(up Link,UL)和下行(down Link,DL)两个方向。其中,UL是指从终端侧向网络侧的传输方向,DL是指从网络侧向终端侧的传输方向。
受限于网络切片的最大流量速率,在网络切片的运行过程中,一般需要对网络切片的网络资源进行管理,尽量避免超出网络切片的最大流量速率的情况。
目前,一般是对网络切片中的终端集合最大比特速率(UE-aggregate maximum bit rate,UE-AMBR)进行控制,实现对网络切片的资源管理。
其中,UE-AMBR用于限制某些终端的所有非保障比特速率(non-guaranteed bit rate,non-GBR)类型业务所能使用的流量速率的总和。换言之,这些终端的所有non-GBR类型业务所能使用的流量速率的总和不能超出终端的UE-AMBR。而无线接入网络(radio access network,RAN)也基于UE-AMBR对终端进行上行和/或下行方向的速率管理控制。
终端可以具备多种类型的业务。按照不同业务对流量速率的要求,可以将终端的业务划分为两类:non-GBR类型业务与保障比特速率(guaranteed bit rate,GBR)类型业务。
可以理解,GBR类型业务对流量速率有最低的保障需求,换言之,GBR类型业务具备最小的流量速率要求,也即GBR(为便于与业务类型区分,后文称为:GBR值)。而non-GBR类型业务则无最低保障需求,换言之,无最小的流量速率要求。例如,视频会话业务对流量速率有最低要求,低于该最低要求则无法实现视频会话,则视频会话业务则为GBR类型业务,而其对流量速率的最低要求则作为视频会话业务的GBR值;而***通知业务对流量速率无最低要求,则***通知业务则为non-GBR类型业务。
不同的GBR类型业务的GBR值可以不同。例如,视频会话业务与信息会话业务都是GBR类型业务,但是,视频会话业务与信息会话业务对流量速率的最低要求不同,则视频会话业务的GBR值与信息会话业务的GBR值不同。
具体而言,对于GBR类型业务而言,网络可以通过预留资源等方式,控制GBR类型业务的数据流在实际比特速率不超过GBR值时能够全部通过。但是,当实际比特速率超出GBR值时,若网络资源不足(或称为网络拥塞)时,则超出GBR值的数据流会被丢弃;若网络资源充足(或称为:网络不拥塞)时,则小于或等于最大比特速率(maximum bit rate,MBR)的数据流也可以通过。
对于non-GBR类型业务而言,如前文,则通过UE-AMBR来限制终端对所有non-GBR类型业务所能使用的总速率。示例性的,图3示出了一种流量速率的控制方法。如图3所示,在对网络切片中non-GBR类型业务进行流量控制时,网络侧的各网元之间可以按照如下步骤进行信息交互:
S302,当接收到终端的注册请求时,AMF向UDM请求获取终端的签约数据。
具体场景中,终端可以注册到一个或多个网络切片,而AMF可以在多个网络切片中共享,因此,AMF接收到的注册请求可以是终端请求注册到一个或多个网络切片的请求。
注册请求中携带有终端的标识信息,如此,AMF可以基于中终端的标识信息,来向UDM请求获取终端的签约数据。如前文,终端的签约数据可以存储在UDR中,UDM可 以自UDR中提取数据,不再重复。
签约数据则可以包括但不限于:终端签约的所有网络切片的标识信息(S-NSSAI或NSSAI),以及,各S-NSSAI对应的签约UE-AMBR。可以理解,一个S-NSSAI对应的签约UE-AMBR,用于限制终端在该S-NSSAI所指示的网络切片中,所有non-GBR类型业务所能使用的流量速率的之和。
S304,UDM向AMF发送终端的签约数据。
UDM可以基于终端的标识信息,自UDR中提取到终端的签约数据,并向AMF发送。图3未详细示出这部分处理。
S306,AMF向PCF请求创建接入管理策略控制信息,其中携带签约UE-AMBR。
S308,PCF创建接入管理策略控制,并向AMF发送响应消息,其中携带授权UE-AMBR。
需要注意的是,授权UE-AMBR一般是基于签约UE-AMBR确定的。例如,授权UE-AMBR一般小于或等于签约UE-AMBR。
另,授权UE-AMBR一般与签约UE-AMBR可以一一对应,换言之,每个S-NSSAI(对应的网络切片)可以对应于一个授权UE-AMBR。或者,也可能存在多个网络切片的授权UE-AMBR相同的情况,不作赘述。
此处对于PCF如何决策并确定授权UE-AMBR的方式不进行限制。
S310,AMF向RAN发送授权UE-AMBR。
具体而言,AMF可以将授权UE-AMBR携带在向RAN发送的消息中,以向RAN发送UE-AMBR。例如,AMF可以在会话资源建立请求、初始上下文建立请求、UE上下文修改请求或切换请求,等任意一种或多种消息中,携带授权UE-AMBR。
或者,AMF也可以单独向RAN发送授权UE-AMBR。
S312,RAN根据授权UE-AMBR,对接入网络切片的所有non-GBR类型业务的流量总速率进行控制。
对终端签约的其中一个网络切片而言,RAN可以对该网络切片中的所有non-GBR类型业务的流量总速率进行控制,使得所有non-GBR类型业务的流量总速率不超过授权UE-AMBR。
需要说明的是,前述GBR值、MBR以及UE-AMBR均可以区分上行或下行。可以理解,在具体利用这些数据进行控制时,对UL方向进行控制,则采用UL方向的GBR值、MBR或UE-AMBR;若对DL方向进行控制,则采用DL方向的GBR值、MBR或UE-AMBR。后续对此不再赘述。
综上,在图3所示的流量速率的控制方法中,针对GBR类型业务与non-GBR类型业务是分别进行控制的。其中,对于GBR类型业务,网络侧通过各业务的GBR值与MBR,控制GBR类型业务使用的流量速率不超过MBR;对于non-GBR类型业务,则通过UE-AMBR来实现总控制。
但是,网络切片的最大流量速率,实际是对接入到该网络切片的所有业务(包括GBR类型业务与non-GBR类型业务)所能够使用的流量速率的总和进行限制。那么,若采用前述针对GBR类型业务与non-GBR类型业务分别进行流量控制的话,则会导致网络切片内的流量速率控制不合理。
示例性的一种场景中,对于每个终端,各GBR类型业务的实际流量速率不超过MBR,而所有non-GBR类型业务的实际流量速率总和不超过授权UE-AMBR。网络侧可以根据每个终端的MBR和授权UE-AMBR,控制接入网络切片发起PDU会话的终端的数量,那么,当新终端(未接入该网络切片的终端)有non-GBR类型业务请求接入时,即便整个网络切片的实际流量速率尚未达到最大流量速率,也不会为该新的non-GBR类型业务分配资源,导致该新终端以及该新终端的non-GBR类型业务被限制或等待。换言之,现有的分类型流量控制方法在实际使用的总速率尚未达到最大流量速率时,就会被限制,网络资源分配不合理。
基于前述问题,本申请实施例提供一种流量控制方法,该方法可以由网络侧的PCF实现。如前,PCF可以在多个网络切片之间共享,也可以属于特定的网络切片,因此,PCF可以按照以下方法实现对一个或多个网络切片的流量控制。以下,为便于说明,以对一个网络切片的流量控制场景为例,对本申请的实现方式作具体说明。
例如,当终端通过注册流程接入到网络切片后,终端即可根据需要向网络切片发起PDU会话,实现通信。相应地,网络侧的PCF即可基于接收到的PDU会话请求而执行该流量控制方法。
示例性的,可以参考图4,PCF可以按照如下方式来实现对网络切片的流量控制,包括如下步骤:
S402,获取目标网络切片中目标网络区域的实际流量速率,实际流量速率用于指示网络切片在目标网络区域中已接入的所有会话占用的流量速率之和。
本申请实施例中,目标网络切片可以为PCF管理的一个或多个网络切片。对于任意的一个目标网络切片而言,目标网络区域可以为该目标网络切片的整个覆盖区域或局部覆盖区域。
例如,在图1所示的场景中,PCF可用于对网络切片1~网络切片3进行策略控制,则目标网络切片可以为网络切片1~网络切片3中的一个或多个。又例如,若目标网络切片为网络切片1,且网络切片1可以覆盖4个网络区域,那么,目标网络区域可以为这4个网络区域中的全部(整个网络切片1)或其中的一个或多个(不等于4)网络区域(网络切片1的部分网络区域)。
具体实现场景中,目标网络区域具体为目标网络切片的整个覆盖区域或者局部区域,可以基于实际场景而预设,本申请实施例对此无特别限制。
S404,根据目标网络区域的上限流量速率与实际流量速率,确定第一会话的授权流量速率,授权流量速率用于指示第一会话允许的最大流量速率。
示例性的,第一会话包括保障比特速率业务,和/或,非保障比特速率业务。授权流量速率用于指示第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者授权流量速率用于指示第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者授权流量速率用于指示第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
其中,实际流量速率则用于指示目标网络区域中所能允许的最大流量速率。
具体而言,当目标网络区域为目标网络切片的整个覆盖区域时,目标网络区域的上限 流量速率,为目标网络切片的最大流量速率,也就是,接入到该目标网络切片的所有PDU会话传输的业务所使用的网络速率的总和。
或者,当目标网络区域为目标网络切片的局部区域时,则目标网络区域的上限流量速率,则为接入到该目标网络切片的目标网络区域的所有PDU会话传输的业务所使用的网络速率的总和。其中,网络切片的局部区域可以是终端所在的跟踪区TA(Tracking Area)或TA列表、小区(Cell)或小区列表等;或者,网络切片的区域还可以按照网络切片连接的不同数据网络DN(Data Network)来划分,PDU会话的目标连接到不同DN,会被划分到不同的网络切片区域,即网络切片的DN区域。例如,局部区域又可称为部分区域。
第一会话为终端向网络侧发起的PDU会话。本申请对第一会话的会话类型、业务类型等均无特别限制,例如,无论第一会话是何种业务的会话,都可以按照本方案进行流量控制。换言之,第一会话可以为终端向目标网络切片中的目标网络区域发起的任意PDU会话。例如,若终端向网络侧发起的第一会话为视频业务PDU会话,则按照本方案确定视频业务PDU会话的授权流量速率;又例如,若终端向网络侧发起的第一会话为游戏业务PDU会话,则按照本方案确定游戏业务PDU会话的授权流量速率。
具体而言,第一会话为终端向目标网络切片发起的PDU会话。换言之,目标网络切片可以包括第一会话请求接入的网络切片。或者,在一种可能的实施例中,目标网络切片即为第一会话请求接入的网络切片。
S406,向第一会话的控制网元发送授权流量速率。
例如,在该步骤中,PCF并不用于承担具体的流量控制功能。PCF通过向控制网元发送授权流量速率,使得控制网元根据授权流量速率来进行流量控制。第一会话的控制网元可以包括:第一会话的发起终端、SMF等,后续对控制网元的处理进行说明,这里不赘述。
综上,在图4所示的实施例中,PCF获取目标网络区域中已接入的所有会话占用的流量速率之和,得到实际流量速率。例如,实际流量速率综合考虑了GBR类型业务与non-GBR类型业务所占用的流量速率。如此,PCF依据实际流量速率与上限流量速率来确定第一会话的授权流量速率,由此实现对目标网络区域的流量控制。相较于现有技术中分别按照授权UE-AMBR和MBR对接入网络切片的UE的数量进行控制,以实现对网络切片的整体流量进行控制的方式,如图4所示的实施例通过控制目标网络区域的流量速率,从而实现了该目标网络区域中的网络资源的合理分配,保障了目标网络区域的安全性与稳定性。
示例性的,当有新的non-GBR类型业务请求接入目标网络区域时,若目标网络区域中所有终端的授权UE-AMBR和授权MBR的总和达到目标网络区域的上限流量速率,但是目标网络切片中目标网络区域的实际流量速率尚未达到目标网络区域的上限流量速率。这种情况下,若按照图3所示方式进行流量控制时,PCF不会为该新的non-GBR类型业务分配网络资源,该新的non-GBR类型业务无法成功建立会话。但是,这种情况下,若按照图4所示方式进行流量控制时,PCF可以为新的non-GBR类型业务的PDU会话分配网络资源,确定其授权流量速率,如此,该新的non-GBR类型业务能够成功建立会话,并接入目标网络区域。相较于图3所示方式,图4所示流量控制方法能够更合理的分配网络资源。
需要注意的是,在图4所示实施例中,S404可以是PCF基于接收到的第一会话的第一消息而触发执行的,其中,第一消息用于请求建立第一会话,或用于请求修改第一会话。具体而言,第一消息可以来自于SMF,后续结合具体实施例详述。
示例性的,第一消息可以具体为会话策略请求(或可称为:会话管理策略请求、会话策略请求)消息。会话策略请求消息可以是SMF基于接收到的第八消息而发送的。
其中,第八消息可以为AMF向SMF发送的请求创建第一会话的上下文请求消息,其中,第八消息则是AMF响应于接收到会话建立请求而向SMF发送的。而会话建立请求可以来自于终端,并经接入网设备转发而到达AMF。可以理解会话建立请求(或称为:会话创建请求、会话请求、用于建立第一会话的消息等,对名称无特别限制)用于请求建立第一会话。具体可参见后续实施例中的图6,此处不展开说明。
或者,第八消息可以为AMF向SMF发送的请求修改第一会话的上下文请求消息,其中,第八消息则是AMF响应于接收到会话修改请求而向SMF发送的。而会话修改请求则可以来自于终端,并经接入网设备转发而到达AMF。可以理解,会话修改请求(或称为:会话修改请求、用于修改第一会话的消息等、业务请求、会话激活请求、用于激活第一会话的用户面消息等,对名称无特别限制)用于请求修改第一会话。
也就是,在一种可能的场景中,PCF可以接收第一消息,并响应于接收到第一消息而触发执行S404。
需要注意的是,S402则不受到第一消息的限制。例如,S402可以在PCF接收到第一会话的第一消息之前、同时或之后执行。
示例性的一种实施例中,PCF可以定时执行S402,也即,PCF可以按照预设的定时时刻或定时时长,获取目标网络切片中目标网络区域的实际流量速率。如此,PCF在接收到第一会话的第一消息时,最接获取最近一次获取到的目标网络区域的实际流量速率,有利于提高目标网络区域的实际流量速率的获取效率,从而,有利于降低终端侧的等待时长。
示例性的一种实施例中,PCF可以周期性的执行S402,也即,PCF周期性获取目标网络切片中目标网络区域的实际流量速率。如此,PCF在接收到第一会话的第一消息时,最接获取最近一个周期获取到的目标网络区域的实际流量速率,有利于提高目标网络区域的实际流量速率的获取效率,从而,有利于降低终端侧的等待时长。
示例性的另一种实施例中,PCF可以在接收到第一会话的第一消息时,执行S402。如此,PCF获取到的目标网络区域的实际流量速率更加准确,有利于实现对目标网络区域的精确流量控制。
可以理解,PCF可以基于前述任意一种或多种实施例而执行S402。
举例说明。在图1所示的场景中,PCF可以在网络切片1~网络切片3之间共享,则PCF可以定时(或者,也可周期性)获取网络切片1~网络切片3及其各网络切片中各局部区域的实际流量速率。这种情况下,PCF可以有如下几种处理方式:
第一种,当PCF接收第一会话的第一消息时,若第一会话的第一消息中携带的网络切片的标识为S-NSSAI1,其中,S-NSSAI1对应的网络切片为网络切片1,则PCF可以据此确定目标网络区域为网络切片1的整个覆盖区域。如前,PCF可以定时获取网络切片1~ 网络切片3及其各网络切片中各局部区域的实际流量速率。此时,当PCF接收到第一会话的第一消息时,PCF可以基于最近一次获取到的网络切片1的实际流量速率,以及网络切片1的上限流量速率,来确定第一会话的授权流量速率,进而,PCF向第一会话的控制网元发送该授权流量速率。如此,有利于提高网络侧的流量控制效率,降低终端侧的等待时长。
第二种,当PCF接收第一会话的第一消息时,若第一会话的建立请求或修改请求中携带的网络切片的标识为S-NSSAI1,以及网络切片的局部区域1的标识(例如终端当前所在跟踪区的标识Tracking Area Identifier,再例如会话连接的数据网络名称Data Network Name),其中,S-NSSAI1对应的网络切片为网络切片1。则PCF可以据此确定目标网络区域为网络切片1中的局部区域1。从而,PCF可以基于最近一次获取到的网络切片1中的局部区域1的实际流量速率,以及网络切片1的局部区域1的上限流量速率,来确定第一会话的授权流量速率,进而,PCF向第一会话的控制网元发送该授权流量速率。
相较于第一种实现方式,该实现方式中,PCF获取网络切片1中的局部区域1的实际流量速率,如此,PCF实际基于目标网络切片的局部区域实现后续的流量速率控制。
第三种,当PCF接收第一会话的第一消息时,若第一会话的建立请求或修改请求中携带的网络切片的标识为S-NSSAI1,其中,S-NSSAI1对应的网络切片为网络切片1,则PCF可以据此确定目标网络区域为网络切片1的整个覆盖区域。在该实施例中,PCF虽然已经定时获取了自身管理的各网络切片及其局部区域的数据,但PCF在接收到第一会话的第一消息后,PCF也可以获取网络切片1在当前时刻的实际流量速率,后续说明获取方式。进而,基于最新获取到的网络切片1的实际流量速率,以及网络切片1的上限流量速率,来确定第一会话的授权流量速率,然后,PCF向第一会话的控制网元发送该授权流量速率。
相较于第一种实现方式,该实现方式中,PCF既可以定时获取自身管理的各网络区域的实际流量速率,也可以响应于接收到第一消息而获取目标网络区域的实际流量速率,有利于提高实际流量速率的准确率,实现对目标网络区域的精确流量控制。
以下对PCF获取目标网络区域的实际流量速率的实现方式进行说明。
本申请实施例中,目标网络区域的实际流量速率的获取可以为如下几种方式中的任一种:
第一种,目标网络区域的实际流量速率可以根据目标网络区域中N6接口的实际流量确定。
其中,N6接口是网络切片内的UPF到DN或本地接入DN的出口。由此,可以汇总目标网络区域中各个N6接口处的实际流量速率,来获取目标网络区域的实际流量速率。也就是,获取目标网络区域中各N6接口处的实际流量速率之和,得到目标网络区域的实际流量速率。
本申请实施例所涉及到的汇总,是指对本服务区域内的所有下级网元(例如,AMF可以作为PCF的下级网元)上报的数据(与实际流量速率或使用带宽相关的数据)进行求和,也就是,获取服务区域内各下级网元上报的数据的加和总数。后续实现方式中对汇总的实现方式与此处相同,后续不再重复。
例如,可以基于N6接口处的上行实际流量速率,确定目标网络区域的上行实际流量 速率。也可以基于N6接口处的下行实际流量速率,确定目标网络区域的下行实际流量速率。
仍以图1所示通信***为例。若网络切片1共包含5个N6接口,则可以将5个N6接口的上行实际流量速率进行汇总,得到网络切片1的上行实际流量速率。可以将5个N6接口的下行实际流量速率进行汇总,得到网络切片1的下行实际流量速率。又例如,若网络切片1包含两个局部区域,其中,局部区域1包含N6接口1~N6接口3,局部区域2包含N6接口4和N6接口5,则可以将N6接口1~N6接口3的上行实际流量速率进行汇总,得到局部区域1的上行实际流量速率,将N6接口1~N6接口3的下行实际流量速率进行汇总,得到局部区域1的下行实际流量速率;将N6接口4和N6接口5的上行实际流量速率进行汇总,得到局部区域2的上行实际流量速率,将N6接口4和N6接口5的下行实际流量速率进行汇总,得到局部区域2的下行实际流量速率。
第二种,目标网络区域的实际流量速率根据目标网络区域中各终端的带宽使用情况确定的。
具体而言,基于带宽使用情况来确定目标网络区域的实际流量速率时,其实质在于获取目标网络区域中所有终端的使用带宽之和。也就是,获取目标网络区域中每个终端的使用带宽,并获取目标网络区域中所有终端的使用带宽之和,即可得到目标网络区域的实际流量速率。
此外,在一种可能的场景中,目标网络区域中各终端的使用带宽相同,将其记为终端的平均使用带宽。由此,只需要获取终端的平均使用带宽与终端数目之积,即可确定目标网络区域的实际流量速率。其中,终端数目可以为:当前已经接入目标网络区域的终端的个数。
例如,可以基于当前接入目标网络区域的终端上行平均使用带宽与终端数目(记为第一数目)之积,确定目标网络区域的上行实际流量速率;基于当前接入目标网络区域的终端下行平均使用带宽与终端数目(记为第二数目)之积,确定目标网络区域的下行实际流量速率。其中,第一数目与第二数目可以相同或者不同。
第三种,目标网络区域的实际流量速率根据目标网络区域中的接入网设备在目标网络切片中的实际流量带宽确定。
在图1或图2所示的通信***中,终端通过接入网设备(AN)接入网络切片,如此,AN可以对通过自身接入网络切片的流量速率进行记录,由此,具体实现S402时,可以对目标网络区域内各AN在该目标网络切片中的实际流量带宽进行汇总(求和处理),如此即可确定目标网络区域的实际流量速率。
需要说明的是,本申请实施例中,目标网络区域的实际流量速率,可以是PCF自行执行的,或者,也可以是由其他的网元确定,并向PCF发送的。
以下具体说明。
本申请的一种实施例中,目标网络区域的实际流量速率可以由数据分析网元NWDAF确定。在该实施例中,PCF执行S402时,可以接收来自于NWDAF的第二消息,第二消息中携带目标网络区域的实际流量速率,以及可选的携带上限流量速率。
在该实施例的一种实现方式中,UPF或SMF可以收集目标网络区域中各个N6接口的上行和/或下行的实际流量速率,然后,UPF或SMF可以向NWDAF发送收集到的N6 接口的实际流量速率,NWDAF可以将各N6接口的实际流量速率进行汇总,得到目标网络区域的实际流量速率,并向PCF发送第二消息。
在该实施例的另一种实现方式中,管理面网元OAM可以获取RAN上报的目标网络区域中的终端的平均使用带宽与终端数目,然后,OAM向NWDAF发送终端的平均使用带宽与终端数目,并由NWDAF获取二者的乘积得到目标网络切片的实际流量速率,并向PCF发送第二消息。或者,OAM在获取到终端的平均使用带宽与终端数目后,可以获取二者的乘积得到目标网络切片的实际流量速率,进而,OAM向NWDAF发送目标网络切片的实际流量速率,NWDAF则可以向PCF发送第二消息。
在该实施例的另一种实现方式中,UPF或SMF可以收集目标网络区域中各个N6接口的上行和/或下行的实际流量速率,然后,UPF或SMF可以向自身所属服务区域的PCF发送收集到的N6接口的实际流量速率,然后,各PCF向NWDAF发送N6接口的实际流量速率,进而,NWDAF可以将各N6接口的实际流量速率进行汇总,得到目标网络区域的实际流量速率,并向接收到第一会话的第一消息的PCF发送第二消息。
在该实施例的另一种实现方式中,目标网络区域中的各AN可以对目标网络区域(或目标网络切片)的上行和/或下行的流量带宽进行测量,各AN通过AMF接入网络切片,而各AMF则可以在自身服务区域中,收集各AN上报的带宽测量结果,之后,可以由AMF将收集到的各AN获取到的带宽测量结果向自身所在服务区域中的PCF发送,从而,各PCF向将各AN获取到的带宽测量结果向NWDAF发送,由NWDAF对各带宽测量结果进行汇总得到目标网络区域的实际流量速率,NWDAF则可以向PCF发送第二消息。
在该实现方式中,可以直接由NWDAF直接进行汇总。除此之外,还可以由AMF对自身服务区域中的各AN上报的数据进行汇总后,将汇总的数据(也即AMF自身服务区域的实际流量速率)向PCF发送,进而由PCF对自身服务区域内的所有AMF上报的数据进行汇总后,向NWDAF发送PCF服务区域内的实际流量速率,或者,PCF也可以直接向NWDAF发送PCF服务区域内的所有AMF上报的数据,从而,由NWDAF进行汇总。除此之外,AMF可直接向PCF发送收集到的各AN上报的带宽测量结果,之后,由PCF对自身服务区域中的各AN上报的数据进行汇总,并向NWDAF发送汇总后的数据。
本申请的另一种实施例中,目标网络区域的实际流量速率可以由数据存储网元UDR确定。在该实施例中,PCF执行S402时,可以接收来自于UDR的第三消息,第三消息中携带目标网络区域的实际流量速率与上限流量速率。
在该实施例的一种实现方式中,UPF或SMF可以收集目标网络区域中各个N6接口的上行和/或下行的实际流量速率,然后,UPF或SMF可以将收集到的N6接口的实际流量速率向UDR发送,UDR可以将各N6接口的实际流量速率进行汇总,得到目标网络区域的实际流量速率,并向PCF发送第三消息。
在该实施例的另一种实现方式中,管理面网元OAM可以获取RAN上报的目标网络区域中的终端的平均使用带宽与终端数目,然后,OAM向UDR发送终端的平均使用带宽与终端数目,并由UDR获取二者的乘积得到目标网络切片的实际流量速率,并向PCF发送第三消息。或者,OAM在获取到终端的平均使用带宽与终端数目后,可以获取二者的乘积得到目标网络切片的实际流量速率,进而,OAM向NWDAF发送目标网络切片的实际流量速率,NWDAF则可以向PCF发送第三消息。
在该实施例的另一种实现方式中,UPF或SMF可以收集目标网络区域中各个N6接口的上行和/或下行的实际流量速率,然后,UPF或SMF可以将收集到的N6接口的实际流量速率向自身所属服务区域的PCF发送,然后,各PCF向UDR发送N6接口的实际流量速率,进而,UDR可以将各N6接口的实际流量速率进行汇总,得到目标网络区域的实际流量速率,并向接收到第一会话的第一消息的PCF发送第三消息。
本申请的另一种实施例中,当目标网络区域为目标网络切片的整个覆盖区域时,可以由目标网络切片中的多个PCF分别对自身服务区域内的实际流量速率进行确定,从而,由PCF对多个PCF的实际流量速率进行汇总,即可得到目标网络切片的实际流量速率。
换言之,当接收来自于目标网络切片的整个覆盖区域中各PCF的第四消息,第四消息携带策略控制网元在自身服务区域内的实际流量速率;并对各服务区域内的实际流量速率进行汇总,得到目标网络区域的实际流量速率。
在该实施例中,各PCF可以对自身服务区域内的实际流量速率进行统计,并由接收到第一会话的第一消息的PCF进行汇总,得到目标网络区域的实际流量速率。示例性的,UPF或SMF可以收集目标网络区域中各个N6接口的上行和/或下行的实际流量速率,然后,UPF或SMF可以将收集到的N6接口的实际流量速率向自身所属服务区域的PCF发送,然后,目标网络区域中的各PCF可以向接收到第一会话的第一消息的PCF发送第四消息。
本申请的另一种实施例中,当目标网络区域为目标网络切片中的局部区域时,可以由局部区域中的各接入和移动管理网元AMF在自身服务区域中,各AN在目标网络切片中的实际流量带宽进行确定,从而,由PCF对局部区域内各AN在目标网络切片中的实际流量带宽进行汇总,即可得到目标网络切片的实际流量速率。
换言之,当目标网络区域为目标网络切片中的局部区域时,接收来自于目标网络切片中的局部区域中的各接入和移动管理网元的第五消息,第五消息携带接入和移动管理网元在自身服务区域中,各接入网设备在目标网络切片中的实际流量带宽;并对各第五消息中的实际流量带宽进行汇总,得到目标网络区域的实际流量速率。
在该实施例中,目标网络区域中的各AN可以对目标网络区域(或目标网络切片)的上行和/或下行的流量带宽进行测量,各AN通过AMF接入网络切片,而各AMF则可以在自身服务区域中,收集各AN上报的带宽测量结果,之后,可以由AMF将收集到的各AN获取到的带宽测量结果,向自身所在服务区域中的PCF(也即:接收到第一会话的第一消息的PCF)发送。
需要说明的是,本申请实施例中,PCF针对上限流量速率与实际流量速率的获取方式可以不同。例如,PCF可以通过NWDAF获取实际流量速率,通过UDR获取上限流量速率。
后续结合具体实施例,对PCF的获取方式进行说明。
基于前述处理,PCF可以获取到目标网络区域的实际流量速率与上限流量速率后,即可基于二者之间的关系,确定第一会话的授权流量速率。
例如,可以通过以下一种或多种方式确定第一会话的授权流量速率:方式一、将实际流量速率与上限流量速率(或基于上限流量速率确定的值)进行比较,并基于比较结果来 确定第一会话的授权流量速率;方式二、获取实际流量速率与上限流量速率之间的比值,并将比值与预设阈值进行比较,来确定第一会话的授权流量速率。
第一会话可以包括GBR类型业务和/或non-GBR类型业务,基于此,第一会话的授权流量速率,至少可以包括如下两个方面:
对于第一会话的GBR类型业务,需要确定第一会话中该GBR类型业务的授权MBR,这与该GBR类型业务的签约MBR(也即签约最大流量速率)或签约GBR(也即签约最小流量速率)相关。
对于第一会话的non-GBR类型业务,需要确定第一会话的授权集合最大比特速率,也即授权Session-AMBR。其中,授权Session-AMBR与签约Session-AMBR相关。
除此之外,后续第三处理中还涉及到授权终端集合最大比特速率,也即,授权UE-AMBR。其中,授权UE-AMBR与终端的签约UE-AMBR相关。
其中,签约MBR、签约GBR、签约Session-AMBR、签约UE-AMBR可以来自于签约数据,后续对签约数据详述说明。
以下,结合目标网络区域的实际流量速率与上限流量速率之间的关系,对第一会话的授权流量速率的确定方式进行说明。具体而言,至少可以有如下三种情况:
第一种情况:当目标网络区域的实际流量速率与上限流量速率满足第一条件时,将第一会话的签约最大流量速率确定为授权流量速率(为便于说明,后续简称作第一处理)。
其中,第一条件指示目标网络区域的可用流量速率较大。这种情况下,无需限制第一会话的授权流量速率,可以直接将第一会话的授权最大流量速率确定为授权流量速率。
换言之,当满足第一条件时,可以将第一会话的签约MBR确定为授权MBR(GBR类型业务),和/或,将第一会话的签约Session-AMBR确定为授权Session-AMBR。
本申请实施例中,目标网络区域的实际流量速率与上限流量速率满足如下任一条件时,可认为满足第一条件。也即,第一条件可以为以下任一种:
条件1.1:目标网络区域的实际流量速率小于上限流量速率。
条件1.2:目标网络区域的实际流量速率小于或等于第一流量速率,其中,第一流量速率小于上限流量速率。
条件1.3:目标网络区域的实际流量速率小于第一流量速率,其中,第一流量速率小于上限流量速率。
条件1.4:目标网络区域的实际流量速率与上限流量速率之间的比值,小于或等于预设的第一阈值;其中,第一阈值小于1。
条件1.5目标网络区域的实际流量速率与上限流量速率之间的比值,小于预设的第一阈值;其中,第一阈值小于1。
可以理解,条件1.2和条件1.3中,针对目标网络区域的实际流量速率等于第一流量速率的情况,是否满足第一条件的判断结果不同,PCF确定第一会话的授权流量速率时,也采取不同的处理方式。例如,按照条件1.2,若目标网络区域的实际流量速率等于第一流量速率,则PCF执行第一处理;但是,按照条件1.3,若目标网络区域的实际流量速率等于第一流量速率,则PCF不执行第一处理,而是执行第二处理,后续说明。条件1.4与条件1.5也属于类似情况,不作赘述。
需要说明的是,前述方式中,条件1.2(或条件1.3)和条件1.4(或条件1.5)为两种 不同的实现方式,第一流量速率与第一阈值无关。例如,第一流量速率与第一阈值对应的实际流量速率之间,二者可以相同,或者,二者也不同(如后续举例时第一流量速率为70,而第一阈值为0.75的情况,后续具体说明)。
除采用条件1.1~条件1.5中的任意一种来判断是否满足第一条件之外,还可以采用条件1.1~条件1.5中无冲突的多种(两种或两种以上)条件来确定PCF是否执行第一处理。
其中,条件1.1与条件1.2~条件1.5中的任意一个都冲突;条件1.2和条件1.3冲突,条件1.4和条件1.5冲突。故而,可以采取条件1.2与条件1.4、条件1.2与条件1.5、条件1.3与条件1.4、条件1.3与条件1.5的组合方式判断是否满足第一条件。
当采用两种以上条件来判断是否满足第一条件时,若满足其中的任意一种条件,即可确定满足第一条件。例如,当以条件1.3与条件1.5的组合方式判断是否满足第一条件时,只要满足条件1.3或条件1.5中的任意一个,即确定满足第一条件,进而执行第一处理。
另一实施例中,当采用两种以上条件来判断是否满足第一条件时,当所有条件都满足时,确定满足第一条件。例如,当以条件1.3与条件1.5的组合方式判断是否满足第一条件时,当既满足条件1.3且满足条件1.5时,确定满足第一条件,进而执行第一处理。
以下,以图1所示通信***为例进行说明。假设目标网络区域为网络切片1,网络切片1的上限流量速率为100(后续说明中均省略单位),第一流量速率为70,第一阈值为0.75。
实现本方案时,可以按照条件1.1确定是否满足第一条件,此时,当网络切片1的实际流量速率在100以内(不等于100)时,满足第一条件,则PCF可以执行第一处理。但是,若不满足该条件,则不执行第一处理,具体执行何种处理,后续说明。
或者,实现本方案时,可以按照条件1.2确定是否满足第一条件,此时,当网络切片1的实际流量速率小于或等于70时,满足第一条件,则PCF执行第一处理。但是,若不满足该条件,则不执行第一处理,具体执行何种处理,后续说明。
或者,实现本方案时,可以按照条件1.4确定是否满足第一条件,此时,当网络切片1的实际流量速率与上限流量速率之间的比值小于或等于0.75时,也即网络切片1的实际流量速率小于或等于75时,满足第一条件,则PCF执行第一处理。但是,若不满足该条件,则不执行第一处理,具体执行何种处理,后续说明。
或者,实现本方案时,可以按照条件1.2与条件1.4确定是否满足第一条件,且满足其中的至少一种条件时,满足第一条件。这种情况下,当网络切片1的实际流量速率为72时,满足条件1.4,但不满足条件1.2,此时满足第一条件,则PCF执行第一处理。当网络切片1的实际流量速率为大于75时,则PCF不执行第一处理,具体执行何种处理,后续说明。
或者,实现本方案时,可以按照条件1.2与条件1.4确定是否满足第一条件,且同时满足条件1.2和条件1.4时,满足第一条件。这种情况下,当网络切片1的实际流量速率为72时,满足条件1.4,但不满足条件1.2,此时不满足第一条件,则PCF不执行第一处理,具体执行何种处理,后续说明。当网络切片1的实际流量速率为小于或等于70时,则PCF执行第一处理。
第二种情况:当目标网络区域的实际流量速率与上限流量速率满足第二条件时,根据 第一会话的签约最大流量速率,确定第一会话的授权流量速率,且授权流量速率小于第一会话的签约最大流量速率(为便于说明,后续简称作第二处理)。
其中,第二条件指示目标网络区域的可用流量速率较小。这种情况下,需要对第一会话的授权流量速率进行限制,使得第一会话的授权流量速率小于其签约最大流量速率,以避免超出目标网络区域的上限流量速率。
在该实施例中,目标网络区域的实际流量速率与上限流量速率满足如下任一条件时,可认为满足第二条件。也即,第二条件可以为以下任意一种:
条件2.1,目标网络区域的实际流量速率小于上限流量速率。
需要注意的是,条件2.1与条件1.1~条件1.5均冲突,不宜同时使用。例如,当目标网络区域的实际流量速率小于上限流量速率时,PCF可以执行第一处理或第二处理。
条件2.2,目标网络区域的实际流量速率大于第一流量速率,且小于上限流量速率。
例如,条件2.2与前述条件1.2、条件1.4或条件1.5中的任意一个可以配合使用。例如,若与条件1.2配合使用,那么,当目标网络区域的实际流量速率小于或等于第一流量速率,则PCF将第一会话的签约最大流量速率确定为其授权流量速率;当目标网络区域的实际流量速率大于第一流量速率且小于上限流量速率,则PCF确定的第一会话的授权流量速率小于其签约最大流量速率。
条件2.3,目标网络区域的实际流量速率大于或等于第一流量速率,且小于上限流量速率。
例如,条件2.3与前述条件1.3、条件1.4或条件1.5中的任意一个可以配合使用。
条件2.4,目标网络区域的实际流量速率与上限流量速率之间的比值,大于预设的第一阈值,且实际流量速率小于上限流量速率。
例如,条件2.4与前述条件1.2、条件1.3或条件1.4中的任意一个可以配合使用。
条件2.5,目标网络区域的实际流量速率与上限流量速率之间的比值,大于或等于预设的第一阈值,且实际流量速率小于上限流量速率。
例如,条件2.5与前述条件1.2、条件1.3或条件1.5中的任意一个可以配合使用。
其中,条件2.4与条件2.5中,“实际流量速率小于上限流量速率”也可以替换为:目标网络区域的实际流量速率与上限流量速率之间的比值小于1,不作赘述。
基于前述条件2.1~条件2.5中的任意一种方式,可以确定当前是否满足第二条件。在前述实施例中,第二条件可视作:目标网络区域的实际流量速率未达到上限流量速率,且不满足第一条件。
基于此,当第一条件为条件1.1~条件1.5中无冲突的两种条件时,若目标网络区域的实际流量速率小于上限流量速率(或者,目标网络区域的实际流量速率与上限流量速率之间的比值小于1),且不满足第一条件,则可确定其满足第二条件,PCF执行第二处理。
仍以前文举例作示例性说明。如前,网络切片1的上限流量速率为100(后续说明中均省略单位),第一流量速率为70,第一阈值为0.75。
因此,若按照条件1.2与条件1.4确定是否满足第一条件,且满足其中的至少一种条件时,满足第一条件。这种情况下,当网络切片1的实际流量速率为72时,满足条件1.4,但不满足条件1.2,此时满足第一条件,则PCF执行第一处理。此时,当网络切片1的实际流量速率为大于75且小于100时,则PCF执行第二处理。
或者,实现本方案时,可以按照条件1.2与条件1.4确定是否满足第一条件,且同时满足条件1.2和条件1.4时,满足第一条件。这种情况下,当网络切片1的实际流量速率为72时,满足条件1.4,但不满足条件1.2,此时不满足第一条件,则PCF不执行第一处理,具体执行何种处理,后续说明。当网络切片1的实际流量速率为小于或等于70时,则PCF执行第一处理。或者,当网络切片1的实际流量速率为大于70且小于100时,则PCF执行第二处理。
当目标网络区域的实际流量速率与上限流量速率满足第二条件时,PCF确定第一会话的授权流量速率时,至少可以有如下的任一处理方式。也即,第二处理可以为以下任意一种:
处理方式2.1,将第一会话的签约最大流量速率按照预设比例进行缩小,得到第一会话的授权流量速率。
具体的,当第一会话仅包含GBR类型业务时,可以按照预设的第一比例缩小签约MBR,即可得到授权MBR。
当第一会话仅包含non-GBR类型业务时,可以按照预设的第二比例缩小签约Session-AMBR,即可得到授权Session-AMBR。
当第一会话同时包含non-GBR类型业务与GBR类型业务时,则PCF按照预设的第一比例缩小签约MBR,得到授权MBR(对于第一会话的GBR类型业务);和/或,PCF按照预设的第二比例缩小签约Session-AMBR,得到授权Session-AMBR(对于第一会话的non-GBR类型业务)。
第一比例与第二比例可以相同,也可以不同,本申请实施例对于预设比例(第一比例、第二比例)的具体取值无特别限制。例如,若第一会话的签约Session-AMBR为10,则可以按照0.8的第二比例,将第一会话的授权Session-AMBR确定为8。又例如,若第一会话的签约最大MBR为12,则可以按照0.5的第一比例,将第一会话的授权MBR确定为5。不作穷举。
处理方式2.2,将第一会话的签约最大流量速率降低预设值,得到第一会话的授权流量速率。
具体的,当第一会话仅包含GBR类型业务时,可以按照预设的第一预设值缩小签约MBR,即可得到授权MBR。
当第一会话仅包含non-GBR类型业务时,可以按照预设的第二预设值缩小签约签约Session-AMBR,即可得到授权Session-AMBR。
当第一会话同时包含non-GBR类型业务与GBR类型业务时,则PCF按照预设的第一预设值缩小签约MBR,得到授权MBR(对于第一会话的GBR类型业务);和/或,PCF按照预设的第二预设值缩小签约Session-AMBR,得到授权Session-AMBR(对于第一会话的non-GBR类型业务)。
第一预设值与第二预设值可以相同,也可以不同,本申请实施例对于预设值(第一预设值、第二预设值)的具体取值无特别限制。例如,若第一会话的签约MBR为12,则可以按照1的预设值,将第一会话的授权MBR确定为9。又例如,若第一会话的签约Session-AMBR为10,则可以按照3的预设值,将第一会话的授权Session-AMBR确定为7。亦不作穷举。
第三种情况:当目标网络区域的实际流量速率与上限流量速率满足第三条件时,执行第三处理,后续详述。其中,第三条件指示目标网络区域无可用流量速率。
本申请实施例中,当目标网络区域的实际流量速率大于或等于上限流量速率时,满足第三条件。此时,目标网络区域无剩余流量。这种处理方式,可以结合前述任意一种第一条件和/或第二条件结合使用。
示例性的一种实施例中,当目标网络区域的实际流量速率小于上限流量速率时(满足条件1.1或条件2.1),PCF可以执行前述第一处理或第二处理,以确定第一会话的授权流量速率;当目标网络区域的实际流量速率大于或等于上限流量速率时,PCF可以执行第三处理,以确定第一会话的授权流量速率。
示例性的另一种实施例中,当目标网络区域的实际流量速率小于或等于第一流量速率时,满足条件1.2,PCF执行前述第一处理,以确定第一会话的授权流量速率;当目标网络区域的实际流量速率大于第一流量速率,且小于上限流量速率时,满足条件2.2,PCF执行前述任一种第二处理,以确定第一会话的授权流量速率;当目标网络区域的实际流量速率大于上限流量速率时,满足第三条件,PCF执行第三处理,以确定第一会话的授权流量速率。
示例性的另一种实施例中,目标网络区域的实际流量速率与上限流量速率之间的比值小于预设的第一阈值时,满足条件1.5,PCF执行前述第一处理,以确定第一会话的授权流量速率;当目标网络区域的实际流量速率大于第一流量速率,且小于1时,满足条件2.5,PCF执行前述任一种第二处理,以确定第一会话的授权流量速率;当目标网络区域的实际流量速率大于上限流量速率时,满足第三条件,PCF执行第三处理,以确定第一会话的授权流量速率。
不再穷举。
以下,对PCF执行第三处理的实现方式进行说明。本申请实施例中,第三处理可以包括但不限于如下的一种方式或多种方式的组合:
处理方式3.1,将第一会话的签约最小流量速率,确定为授权流量速率。
具体而言,当第一会话仅包含GBR类型业务时,PCF可以将第一会话的签约最小流量速率,也即签约GBR,确定为第一会话的授权MBR。
当第一会话仅包含non-GBR类型业务时,PCF可以将授权Session-AMBR确定为仅能保障non-GBR类型业务的基础通信,即授权Session-AMBR为签约Session-AMBR的最小值。
当第一会话同时包含non-GBR类型业务与GBR类型业务时,则PCF将第一会话的签约GBR,确定为第一会话的授权MBR(对于第一会话的GBR类型业务);和/或,PCF将仅能保障non-GBR类型业务的最小流量速率确定为第一会话的授权Session-AMBR(对于第一会话的non-GBR类型业务),即授权Session-AMBR为签约Session-AMBR的最小值。
这种处理方式中,网络侧为终端提供能够满足第一会话的最基础通信需求的签约最小流量速率,第一会话能够成功建立。
处理方式3.2,将目标网络切片的签约终端集合最大比特速率的最小值,确定为授权终端集合最大比特速率。
在该处理方式中,PCF可以将终端(第一会话的发起端)仅能保障业务通信的最小流量速率确定为该终端的授权UE-AMBR。如此,该终端可以基于最小的UE-AMBR接入网络切片,即授权UE-AMBR为签约UE-AMBR的最小值。
处理方式3.3,拒绝为第一会话分配授权流量速率。
可以理解,该处理方式3.3与处理方式3.1不可同时使用。当目标网络区域中无可用流量速率时,可以拒绝第一会话接入网络,如此,能够控制目标网络区域的实际流量速率不超出或不会过多超出上限流量速率,尽可能保证已接入目标网络切片的其他会话的正常通信使用。
在该处理方式的一种可能的实施例中,当满足前述第三条件时,PCF可以(通过其他网元)向终端发送通知消息,该通知消息用于指示网络侧拒绝第一会话接入目标网络切片。或者,在该处理方式的另一种可能的实施例中,当满足前述第三条件时,PCF可以不对第一会话的第一消息进行反馈。或者,在该处理方式的另一种可能的实施例中,当满足前述第三条件时,PCF可以向终端反馈其授权流量速率为0。
处理方式3.4,在目标网络区域中,释放非保障比特速率业务(non-GBR类型业务)的业务质量数据流(QoS Flow)。
在网络切片的资源受限的情况下,为了保障高优先级的业务体验,可以通过业务质量(quality of service,QoS)机制,优先为高优先级的业务分配资源。
在QoS机制中,一个PDU会话内可以包含一个或多个QoS Flow,业务质量数据流又可以称为:业务数据流、用户业务数据流或QoS流,本申请对此无特别限定。QoS流可以利用业务质量类别指示符(QoS class identifier,QCI)或第五代网络业务质量指示符(5G QoS identifier,5QI)来进行标识。
每个QoS流具备QoS参数,QoS参数中包括:分配和保持优先级(allocation and retention priority,ARP)参数。ARP参数主要包括三个要素:优先级(Priority Level)、抢占能力(pre-emption capability)与被抢占意愿(pre-emption vulnerability)。不同QoS流的QoS参数一般不同。QoS流的QoS参数可以存储在终端的签约数据中,后续详述。
其中,优先级用于对QoS流在资源紧张情况下成功建立会话的优先级。一般情况下,优先级为整数,优先级的数值越小其优先级越高。或者,也可以存在数值越大优先级越高的情况,对此无特殊限制。抢占能力用于对Qos流能否在资源不足的情况下抢占其他低优先级承载的资源进行标识。被抢占意愿用于对Qos流能否在资源不足的情况下释放承载的资源进行标识。
在处理方式3.4中,当满足第三条件时,目标网络区域无可用流量速率,则可以释放non-GBR类型业务的QoS流。由于non-GBR类型业务无最低保障流量速率,暂时将其释放掉对目标网络区域的影响较小,如此,可以为目标网络区域释放部分可用的流量速率,避免目标网络区域的实际流量速率超出或过多超出其上限流量速率,保证已接入目标网络切片的会话能够享受网络服务。
例如,PCF可以释放所有non-GBR类型业务的QoS流;或者,可以释放部分non-GBR类型业务的QoS流。例如,PCF可以随机释放部分non-GBR类型业务的QoS流,直至实际流量速率小于上限流量速率。又例如,PCF可以在当前接入的所有PDU会话的non-GBR类型业务中,释放预设比例(例如50%、80%等)的PDU会话的non-GBR类型业务的QoS 流。又例如,PCF可以按照各non-GBR类型业务所属PDU会话接入目标网络切片的接入顺序,优先释放先接入的non-GBR类型业务的QoS流。又例如,PCF可以按照各non-GBR类型业务的QoS流的优先级,优先释放优先级较低的non-GBR类型业务的QoS流。对释放QoS流的方式及过程不作穷举。
处理方式3.5,释放目标网络区域中的低优先级会话。
在该处理方式中,可以基于QoS流的QoS参数中的优先级,将优先级较低的部分PDU会话(的QoS流)释放掉,以释放目标网络区域的流量速率,为第一会话或其他已接入目标网络切片的PDU会话争取流量带宽。
在该处理方式的一种可能的实施例中,可以预设优先级阈值,从而,PCF可以将优先级低于优先级阈值的QoS流所属的PDU会话释放掉。
在该处理方式的另一种可能的实施例中,PCF可以基于各PDU会话的QoS流的优先级顺序,按照优先级从低到高的顺序,依次释放各QoS流所属的PDU会话。该实施例中,释放PDU会话的终止条件可以包括但不限于:剩余PDU会话的QoS流的优先级都大于或等于预设的优先级阈值、无剩余PDU会话(所有PDU会话都被释放掉)、目标网络区域的实际流量速率小于上限流量速率。
处理方式3.6,修改第一会话的业务质量参数(QoS参数),业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
在该处理方式,可以对第一会话的一个或多个QoS流的QoS参数进行调整,具体包括:提高第一会话的QoS流的优先级、提高第一会话的QoS流的抢占能力、降低第一会话的QoS流的被抢占意愿中的一个或多个。
处理方式3.7,请求重新调整目标网络区域的上限流量速率。
换言之,当目标网络区域中再无可用流量速率时,还可以请求UDM或UDR重新为目标网络区域重新分配上限流量速率。
以一个网络切片为例,一个网络切片可以由M(M为大于1的整数)个网络区域构成,由此,也可以将网络切片的上限流量速率划分成M份,一个网络区域具备一个上限流量速率,其上限流量速率也可以视为该网络区域的配额。可以理解,M个网络区域的上限流量速率之和,即为该网络切片的上限流量速率。而UDM或UDR则可以用于对各网络区域的上限流量速率进行配置。
由此,当目标网络区域的实际流量速率大于或等于其上限流量速率时,该目标网络区域中再无可用流量速率,此时,PCF还可以向UDM或UDR发送请求消息,以请求为目标网络区域重新分配上限流量速率。具体而言,该请求消息用于请求提高目标网络区域的上限流量速率。
相应地,接收到该请求消息的UDM或UDR,可以基于其他网络区域的流量使用情况(实际流量速率与其上限流量速率之间的关系),重新调整目标网络区域的上限流量速率。其中,其他网络区域可以包括但不限于:目标网络区域所属网络切片中的其他局部网络区域,或者,与目标网络区域距离在预设范围内的其他网络切片,或者,终端通过当前AN与当前AMF能够接入的其他网络切片,不作穷举。
本申请实施例对于UDM或UDR如何调整目标网络区域的上限流量速率无特别限制,本申请实施例提供如下实施例,以供说明。
示例性的一种实施例中,UDM(或UDR)可以判断是否存在实际流量速率与上限流量速率之比是否小于预设的第二阈值的其他网络区域,若存在实际流量速率与上限流量速率之比是否小于预设的第二阈值的第一网络区域,则UDM(或UDR)可以降低第一网络区域的上限流量速率,并提高目标网络区域的上限流量速率。例如,将第一网络区域的上限流量速率降低30,并将目标网络区域的上限流量速率增加30。
示例性的另一种实施例中,UDM(或UDR)可以在其他网络区域中,基于各网络区域中实际流量速率与上限流量速率之差大于第三阈值的第二网络区域,第二网络区域的数目可以为一个或多个。由此,UDM(或UDR)可以降低多个第二网络区域的上限流量速率,并提高目标网络区域的上限流量速率。例如,将第二网络区域1的上限流量速率降低15,将第二网络区域2的上限流量速率降低10,并将目标网络区域的上限流量速率增加25。
基于前述调整,UDM(或UDR)可以向PCF发送响应消息,该响应信息指示目标网络区域调整后的上限流量速率。相应地,PCF在接收到该响应消息后,可以基于调整后的上限流量速率,重新确定第一会话的授权流量速率(授权UE-AMBR、授权Session-AMBR与授权MBR中的一种或多种)。重新确定的方式如前,不再重复。
此外,在处理方式3.7中,还可能存在无法为目标网络区域申请到额外配额的情况,也就是,响应消息指示目标网络区域的上限流量速率不变,或指示无可调整配额。例如,UDM(或UDR)经前述判断,并不存在第一网络区域或第二网络区域,无法为目标网络区域分配额外的配额,此时,UDM可以拒绝为目标网络区域调整上限流量速率。这种情况下,PCF在接收到响应消息时,可以结合前述处理方式3.1~3.6来实现调整。例如,当PCF为目标网络区域申请调整上限流量速率失败时,PCF可以拒绝为第一会话分配授权流量速率。
本申请实施例中,当满足前述第三条件时,PCF可以在前述处理方式3.1~3.7中,除3.1和3.3无法同时使用外,按照其中的一种或两种以上的处理方式,实现对目标网络区域的流量控制。
对前述处理方式3.1~3.7单独实现的方式不作赘述。当以其中的两个或两个以上的处理方式组合实现本方案时,处理方式3.1可以与除处理方式3.3之外的其他处理方式(3.2、3.4~3.7中的一种或多种)组合使用。而处理方式3.3可以与除处理方式3.1之外的其他处理方式(3.2、3.4~3.7中的一种或多种)组合使用。
示例性的,处理方式3.1和处理方式3.2可以组合使用。也就是,当目标网络区域的实际流量速率大于或等于上限流量速率时,PCF可以将第一会话的签约最小流量速率(GBR和/或签约Session-AMBR的最小值),确定为授权流量速率,以及,PCF还可以将目标网络切片的签约UE-AMBR的最小值,确定为授权UE-AMBR。
示例性的,处理方式3.1~3.2、3.4~3.7可以组合使用。也就是,当目标网络区域的实际流量速率大于或等于上限流量速率时,PCF可以将第一会话的签约最小流量速率(GBR和/或签约Session-AMBR的最小值),确定为授权流量速率;以及,PCF还可以将目标网络切片的签约UE-AMBR的最小值,确定为授权UE-AMBR;以及,PCF还可以在目标网络区域中,释放non-GBR类型业务的QoS Flow;以及,PCF还可以释放优先级低于预设优先级阈值的QoS流所属的PDU会话;以及,PCF还可以修改第一会话中的一 个或多个QoS Flow的QoS参数。
示例性的,处理方式3.2~3.7可以组合使用。也就是,当目标网络区域的实际流量速率大于或等于上限流量速率时,PCF可以拒绝为第一会话分配授权流量速率;以及,PCF还可以将目标网络切片的签约UE-AMBR的最小值,确定为授权UE-AMBR;以及,PCF还可以在目标网络区域中,释放non-GBR类型业务的QoS Flow;以及,PCF还可以释放优先级低于预设优先级阈值的QoS流所属的PDU会话;以及,PCF还可以修改第一会话中的一个或多个QoS Flow的QoS参数;以及,PCF还可以向UDR或UDM请求调整目标网络区域的上限流量速率。
在上述实施例中,签约MBR、签约GBR、签约Session-AMBR、签约UE-AMBR,以及默认的5QI(5G QoS identifier,5G业务质量标识)和ARP等QoS参数,都可以保存在终端的签约数据中。
终端的签约数据,又可以称为:会话管理签约信息,本申请实施例对其命名无特别限制。终端的签约数据可以是终端签约到网络时(注册过程)确定的。或者,终端的签约数据也可能受到其他网元,如应用功能(application function,AF)网元,的修改或编辑,后续对该过程展开说明,这里不赘述。
在如图2所示的5G通信***中,终端的签约数据一般可以存储在UDR中,而UDM(或其他网元)可以自UDR中取出这些签约数据,并由自身或其他网元对签约数据做进一步的修改或应用。
示例性的,SMF可以接收到第八消息,如此,SMF可以基于第八消息中携带的终端的标识,向UDM请求该终端的签约数据。相应地,UDM可以从UDR中取出终端的签约数据,并向SMF发送终端的签约数据。从而,SMF可以基于这些签约数据,向PCF发送创建第一会话的会话策略请求消息,进而由PCF基于如图4所示的处理,确定第一会话的授权流量速率。
示例性的,UDM可以从UDR中取出终端的签约数据,并将其向PCF或SMF,而PCF可以根据可以应用业务的需求,为专用的QoS流指定QoS参数(相当于对专用QoS流作QoS参数的配置或修改),并将指定的QoS参数传递到SMF。
示例性的,SMF可以自UDM或UDR中获取到终端的签约数据,或者,可以接收来自于PCF配置的指定QoS参数,基于这些数据,SMF可以对当前正在处理(创建或修改)的QoS流的QoS参数(包括ARP参数)进行确定(配置或修改),并将确定后的QoS参数通过AMF传递到无线接入网络(radio access network,RAN)。相应地,RAN可以基于接收到的QoS参数,确定当前QoS流是否可以抢占其他低优先级QoS流承载的资源。对此不展开详述。
基于前述区分处理,PCF能够确定第一会话的授权流量速率,进而,将其发送给第一回话的控制网元,由控制网元基于授权流量速率实现对第一会话的流量控制,进而也能够实现对目标网络区域的流量控制。
在例如,PCF可以直接将第一会话的授权流量速率单独向其控制网元发送,或者,PCF可以将第一会话的授权流量速率携带在其他消息中,并随其消息一起向控制网元发送。
示例性的一种实施例中,PCF可以向控制网元发送策略和计费控制规则(policy&charging control rule,PCC rule)消息,该PCC rule中携带有第一会话的授权流量速率。
可以理解,PCF与第一会话的控制网元之间,可以直接交互,也可以通过其他网元的转发而间接交互,对此不予限制。
相应地,控制网元侧可以按照如图5所示的方法对第一会话进行流量控制。如图5所示,该方法包括:
S502,接收来自于策略控制网元的授权流量速率,其中,授权流量速率用于指示第一会话允许的最大流量速率,授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的。
具体而言,PCF侧确定授权流量速率的方式,可以参考前文图4中的S404的具体实现方式,以及,PCF侧获取目标网络区域的实际流量速率的方式,也可以参考前文图4中的S402的具体实现方式。此处都不再重复。
可以理解,控制网元接收到的授权流量速率是PCF确定的,例如,控制网元可以接收PCF直接发送的授权流量速率,也可以间接接收(通过其他网元的转发)来自于PCF的授权流量速率。
S504,基于授权流量速率,对第一会话进行流量控制。
本申请实施例中,第一会话的控制网元,可以包括SMF。
或者,在一些可能的实现场景中,第一会话的发起终端也可以作为第一会话的控制网元,对第一会话的上行流量速率进行控制。此时,第一会话的控制网元包括:SMF与终端。
对于SMF而言,当SMF接收到第一会话的授权流量速率后,对第一会话进行流量控制的方式可以为:
控制用户面网元(UPF)为第一会话分配质量业务流(QoS Flow),从而,基于第一会话的已经分配的质量业务流的最大流量速率,确定第一会话的最大流量速率。当第一会话的最大流量速率大于授权流量速率时,修改新分配的质量业务流的最大流量速率,和/或,修改第一会话的当前已分配的质量业务流的最大流量速率。
也就是,当UPF为第一会话分配新的QoS Flow后,若第一会话的所有QoS Flow的MFBR之和大于第一会话的授权流量速率,则SMF可以修改第一会话的新分配的QoS Flow的MFBR,和/或,修改原有的QoS Flow的MFBR,以使得第一会话的所有QoS Flow的MFBR之和不超过第一会话的授权流量速率。
以第一会话的GBR类型业务为例,举例说明。第一会话可以包括多个QoS Flow,假设当前UPF已经为第一会话分配的QoS Flow为:QoS Flow1~QoS Flow5,而UPF当前为第一会话最新分配的QoS Flow为QoS Flow6。那么,当QoS Flow1~QoS Flow6的MFBR之和超出第一会话的授权MBR时,SMF可以对QoS Flow6的MFBR进行修改,和/或,SMF也可以对QoS Flow1~QoS Flow5中的一个或多个的MFBR进行修改,以使得QoS Flow1~QoS Flow6的MFBR之和不超出第一会话的授权MBR。
例如,第一会话可以包括GBR QoS Flow和/或,non-GBR QoS Flow,由此,SMF对第一会话进行流量控制时,可以按照如下方式进行控制:
修改新分配的保障比特速率质量业务流(GBR QoS Flow)的最大流量速率。例如,前述举例中说明的修改QoS Flow6的MFBR。
修改第一会话的当前已分配的保障比特速率质量业务流(GBR QoS Flow)的最大流量速率。例如,前述举例中,SMF可以对QoS Flow1~QoS Flow5中的一个或多个的MFBR 进行修改。
修改第一会话的非保障比特速率质量业务流(non-GBR QoS Flow)的最大流量速率,即修改Session-AMBR。
此外,在SMF控制UPF为第一会话分配QoS Flow时,UPF为第一会话分配QoS Flow时,也可以承担部分流量控制功能。
一方面,对于第一会话中的non-GBR类型业务,SMF可以通过N4接口,向UPF发送第一会话的授权Session-AMBR。如此,UPF在后续针对第一会话的non-GBR类型业务的数据传递过程中,对第一会话的non-GBR类型业务的上行流量速率按照接收到的UL Session-AMBR进行控制,对第一会话的non-GBR类型业务的下行流量速率按照接收到的DL Session-AMBR进行控制。
另一方面,对于第一会话中的GBR类型业务,SMF可以基于接收到的PCC rule,确定如下信息:QoS flow的检测规则、QoS flow标识、以及每个QoS flow的上行和下行的保障流量速率(guaranteed flow bit rate,GFBR)和最大流量速率(maximum flow bit Rate,MFBR)。并且,SMF可以将这些信息通过N4接口向UPF发送,以请求UPF为第一回话分配QoS Flow。那么,对于第一会话的GBR类型业务中各QoS Flow的上行流量速率,UPF可以按照上行MFBR(也即UL MFBR)进行控制,对于第一会话的GBR类型业务中各QoS Flow的下行流量速率,UPF可以按照下行MFBR(也即DL MFBR)进行控制。
可以理解,SMF可以基于接收到的授权流量速率,对第一会话的上行与下行流量速率分别进行控制。
除此之外,向网络侧发起第一会话的创建或修改请求的终端,也可以作为第一会话的控制网元。此时,PCF除向SMF发送第一会话的授权流量速率,以通过SMF控制上下行流量速率之外,还可以向终端发送第一会话的授权流量速率。
此时,终端也作为第一会话的控制网元,可以基于接收到的授权流量速率,对第一会话的上行流量速率进行流量控制。
可以理解,终端无权控制下行流量速率,因此,将终端作为第一会话的控制网元,可以与SMF侧的上下行流量控制方式配合,以实现流量控制。
具体而言,终端可以控制第一会话的non-GBR类型业务的上行流量速率,不超出授权UL Session-AMBR;以及,可以控制第一会话的GBR类型业务的上行流量速率,不超出授权UL MBR。
示例性的,图6示出了本申请实施例提供的一种流量控制方法的信息交互示意图。如图6所示,该方法包括:
S602,PCF向NWDAF发送针对候选网络区域的速率分析请求。
其中,候选网络区域可以为候选网络切片的整个覆盖区域或局部区域;候选网络切片的数目可以为一个或多个;候选网络切片为PCF管理的网络切片。
例如,在图1所示场景中,PCF具备网络切片1~网络切片3的管理权限,则PCF可以向NWDAF发送针对网络切片1~网络切片3的速率分析请求。
S604,NWDAF与UDR交互,获取候选网络区域的上限流量速率。
例如,NWDAF可以向UDR发送上限流量速率的获取请求,并接收来自于UDR的响应消息,该响应消息中携带候选网络区域的上限流量速率。
或者,UDR还可以定时或周期性向NWDAF发送各PCF具备管理权限的各网络切片的上限流量速率,而NWDAF可以接收来自于UDR的数据,并从中获取候选网络区域的上限流量速率。
本申请实施例中,当涉及两个网元之间进行交互以获取某一信息(或数据)的处理时,可以是A网元向B网元发送请求消息,且A网元接收来自于B网元的响应消息的方式,来获取这些信息;或者,也可以是B网元定时或定期向A网元发送消息,A网元直接接收消息的方式,获取这些信息。后续涉及两个网元之间交互的实施例中,均不再赘述,均可采用这种方式。
在该实施例中,UDR可以自UDM中获取数据。除此之外,NWDAF也可以直接与UDM进行交互,来获取候选网络区域的上限流量速率,不再赘述。
S606,NWDAF与SMF交互,获取候选网络区域中各N6接口的实际流量速率。
S608,NWDAF向PCF发送分析结果通知。
该分析结果通知中携带候选网络区域的实际流量速率与上限流量速率。
在一实施例中,候选网络区域的实际流量速率可以是NWDAF汇总得到的。也就是,SMF可以收集候选网络区域中各N6接口处的实际流量速率,并上报至NWDAF;之后,由NWDAF对候选网络区域中各N6接口处的实际流量速率作求和处理,得到候选网络区域的实际流量速率。
在另一实施例中,候选网络区域的实际流量速率可以是SMF汇总得到的。也就是,SMF可以收集候选网络区域中各N6接口处的实际流量速率,然后,SMF对收集到的各N6接口处的实际流量速率进行汇总,得到候选网络区域的实际流量速率,并向NWDAF发送候选网络区域的实际流量速率。
S610,UE通过AN向AMF发送第一会话的请求消息。
在图6所示实施例中,第一会话的请求消息可以具体为:第一会话的会话建立请求消息,如前,该消息用于请求创建第一会话。除此之外,第一会话的请求消息还可以为第一会话的会话修改消息,这里不展开详述。
示例性的,该消息可携带目标网络区域的标识信息,用于请求接入目标网络区域并建立PDU会话。示例性的,该第一会话的请求消息中可以携带目标网络切片的S-NSSAI。
其中,目标网络区域属于候选网络区域。
进一步的,目标网络区域可以为候选网络区域中的局部区域。例如,候选网络切片为多个网络切片,目标网络区域为这多个网络切片中的一个网络切片,或者为其中的一个网络切片的局部区域。
又例如,在前述S602的举例中,候选网络区域为网络切片1~网络切片3,PCF可以基于NWDAF获取到网络切片1~网络切片3的实际流量速率。这种情况下,若第一会话的请求消息中携带S-NSSAI1,则S-NSSAI1所标识的网络切片1为目标网络切片。此时,网络切片1(目标网络切片)属于候选网络切片(网络切片1~网络切片3)。
或者,目标网络区域为候选网络区域中的全部覆盖区域。例如,候选网络切片为网络切片1,目标网络区域也是网络切片1。
S612,AMF向SMF发送创建第一会话的上下文请求消息。
其中,创建第一会话(PDU会话)的上下文请求消息中携带有目标网络区域的标识信 息。
如前,该创建第一会话的上下文请求消息即为前文提及的第八消息,而AMF基于接收到的第一会话的会话建立请求消息而向SMF发送第八消息。
S614,SMF与UDR交互,获取UE的签约数据。
如前,UE的签约数据可以包括但不限于:签约Session-AMBR、签约MBR,默认的5QI和ARP等QoS参数,不作赘述。
除S614所示方式之外,SMF还可以直接与UDM进行交互,以获取UE的签约数据,不作赘述。
S616,SMF向PCF发送创建第一会话的会话策略请求消息。
也即,SMF向PCF发送第一消息,且该第一消息中携带UE的签约数据。
示例性的,除UE的签约数据之外,会话策略请求消息中还可以携带如下信息:终端标识、终端用户组标识、会话类型、数据网络名称、终端IPv4地址或IPv6网络前缀、目标网络切片的S-NSSAI(或进一步携带网络切片中的一个或多个局部区域的标识)、签约Session-AMBR、签约MBR以及默认的5QI和ARP等QoS参数。
S618,PCF与UDR交互,获取第一会话相关的策略数据。
除此之外,PCF还可以直接与UDM交互,获取第一会话相关的策略数据。
第一会话的策略数据,包括:来自于AF的应用相关信息、是否对目标网络区域进行流量控制的指示信息、目标网络切片的上行、下行的上限流量速率中的一种或多种。
其中,应用相关信息来自于AF,可以是AF通过N5接口或Rx接口发送的。示例性的,应用相关信息可以包括:应用的上行、下行的数据流的检测规则,应用业务所需要的最小带宽、应用业务可能使用的最大带宽等。
另,当策略数据指示对目标网络区域进行流量控制时,执行本方案;本申请实施例对于策略数据指示无需对目标网络区域进行流量控制的情况不作讨论。
此外,在该实施例中,前述S604步骤可以省略,PCF可在该步骤中获取到目标网络区域的上限流量速率。换言之,PCF获取实际流量速率与上限流量速率的执行次序、方式无特定关联,PCF可通过前述任意一种方式获取实际流量速率与上限流量速率。
S620,PCF确定第一会话的授权流量速率。
该步骤中,PCF可以基于目标网络区域的实际流量速率与上限流量速率,确定第一会话的授权流量速率。其实现方式有多种,详细可参见前文,此处不再重复。
具体而言,第一会话的授权流量速率,可以包括:第一会话的授权Session-AMBR和/或授权MBR。
S622,PCF向SMF发送创建会话管理策略控制响应消息。
该消息中携带第一会话的授权流量速率。
换言之,创建会话管理策略控制响应消息中可以携带第一会话的授权Session-AMBR和/或授权MBR。
示例性的,创建会话管理策略控制响应消息可以携带在PPC rule消息中。
S624,SMF向AMF发送创建第一会话上下文响应消息。
该消息中携带第一会话的授权Session-AMBR。
S626,AMF向AN发送N2接口会话建立请求消息。
该消息用于向AN请求建立N2接口会话,且消息中携带第一会话的授权Session-AMBR。
S628,AN为第一会话创建N2接口会话,并向UE发送会话建立接受消息。
S630,SMF基于第一会话的授权流量速率,对第一会话的上下行流量进行控制。
示例性的,SMF对第一会话的流量控制可以包括以下一项或多项:基于授权UL Session-AMBR,对non-GBR业务的上行流量进行流量控制;基于授权DL Session-AMBR,对non-GBR业务的下行流量进行流量控制;基于授权UL MBR,对GBR业务的上行流量进行流量控制;或基于授权DL MBR,对GBR业务的下行流量进行流量控制。具体控制方式详见前述图5及其相关实施例,不作赘述。
S632,UE基于第一会话的授权Session-AMBR,对第一会话的上行流量进行控制。
如此,终端侧可以对第一会话的non-GBR类型业务的上行流量进行流量控制。
综上,在图6所示的实施例中,PCF可以基于与NWDAF的交互,获取到目标网络切片的实际流量速率,以及,PCF通过与UDR的交互获取到目标网络区域的上限流量速率。进而,PCF据此确定第一会话的授权Session-AMBR与授权MBR,并据此实现对第一会话以及目标网络区域的流量管理。
此外,如前,在本申请的一种实施例中,目标网络切片(或目标网络区域)中可以有多个PCF,每个PCF都可以收集自身服务区域内的各个SMF收集到的各N6接口的实际流量速率,如此,目标网络切片(或目标网络区域)中的各个PCF可以将收集到的数据上报至UDM、UDR或某一个PCF,由这些网元进行汇总得到目标网络切片(或目标网络区域)的实际流量速率。
示例性的,图7示出了这种情况。为便于说明,将PCF1作为本方案的执行主体进行说明,示例性的,图7示出了PCF1服务区域内的一个SMF,即图7中的SMF1;以及,示例性的,图7还示出了该目标网络区域中的PCF2,以及,在PCF2服务区域中的SMF2。
可以理解,在目标网络区域中,可以包括但不限于PCF1,PCF2仅为示例性的,对例如目标网络区域包含的PCF的数目无特别限制。以及,各PCF包含一个或多个SMF,图7仅示例性的示出一个PCF服务区域中的一个SMF,对例如PCF服务区域中包含的SMF的数目亦无特别限制。
如图7所示,该方法包括如下步骤:
S702,PCF1向SMF1发送服务区域切片带宽测量请求。
示例性的,该请求中可以携带SMF服务区域内网络切片的标识(S-NSSAI)。
S704,SMF1向UPF发送流量带宽测量结果的上报请求。
示例性的,该上报请求用于指示UPF上报流量带宽测量结果。该上报请求可以通过N4接口发送。
S706,UPF向SMF1发送流量带宽测量结果1。
示例性的,UPF可以监控和测量SMF1的服务区域内各N6接口的上行和下行流量速率,并向SMF1上报流量带宽测量结果1。
其中,流量带宽测量结果1包含的数据即为:SMF1的服务区域内各N6接口的上行和下行流量速率。
实际是现场场景中,UPF可以定时上报流量带宽测量结果1;或者,UPF可以周期性 上报流量带宽测量结果1;或者,UPF还可以在实际流量速率的变化量超过预设变化阈值时,上报流量带宽测量结果1。
其中,实际流量速率的变化量是指在在当前的单位时间区间内采集到的实际流量速率,与上一单位时间区间采集到的实际流量速率之间的差值,或差值的绝对值。而单位时间区间可以基于实际场景预设,例如,单位时间区间可以为1s,或者,可以为10s、1min等,不作穷举,亦无其他限制。
S708,SMF1确定SMF1服务区域的上行和下行流量速率。
也即,SMF1对服务区域内各N6接口的上行和下行流量速率,分别进行汇总,得到SMF1服务区域的上行和下行流量速率。也就是,SMF1对服务区域内各N6接口的上行流量速率进行汇总,得到SMF1服务区域的上行流量速率;以及,SMF1对服务区域内各N6接口的下行流量速率进行汇总处理,得到SMF1服务区域的下行流量速率。
需要说明的是,在其他的可能的实施例中,该步骤可以省略,SMF1可以直接将自身服务区域内各N6接口的上行和下行流量速率,向PCF1发送,由PCF1直接进行汇总处理。
S710,SMF1向PCF1发送流量带宽测量结果2。
区别于流量带宽测量结果1,流量带宽测量结果2携带的数据为:SMF1的服务区域的上行和下行流量速率。
S712,PCF2与SMF2交互,获取流量带宽测量结果3。
其中,流量带宽测量结果3携带的数据为:SMF2自身服务区域内的各N6接口的上行和下行流量速率。这部分的处理过程与S702~S706的过程类似,SMF2可以与自身服务区域内的PCF进行交互,获取SMF2自身服务区域内的各N6接口的上行和下行流量速率。
或者,
流量带宽测量结果3携带的数据为:SMF2的服务区域的上行和下行流量速率。这部分的处理过程与S702~S710的过程类似,SMF2可以与自身服务区域内的PCF进行交互,获取SMF2自身服务区域内的各N6接口的上行和下行流量速率,然后,SMF2还可以对自身服务区域内的各N6接口的上行和下行流量速率分别进行汇总处理,得到SMF2的服务区域的上行和下行流量速率。
需要说明的是,如图7所示,S702~S710,与,S712之间无执行顺序上的限制,例如,S712可以早于S702,也可以晚于S702,或者,也可以在S702~S710执行过程中的任意一个步骤实现。其步骤标记符号(例如S712)对于步骤的执行顺序无特殊限制。
S714,PCF2向PCF1发送流量带宽测量结果3。
S716,PCF1汇总流量带宽测量结果2与流量带宽测量结果3,得到目标网络区域的实际流量速率。
S718,PCF1与UDM交互,获取目标网络区域的上限流量速率。
之后,PCF1、UDM、NWDAF、UPF、SMF1、AMF1、CN与UE之间执行S720~S742。具体交互过程如图7所示,这些步骤的具体实现可以参考图6所示实施例中对S610~S632的描述。相较于S610~S632中的SMF与PCF,图7中执行S720~S742则是利用SMF1与PCF1来实现交互。不再重复说明。
需要说明的是,本申请实施例所提供的流量控制方法,可以适用于UE处于归属网络或漫游到拜访网络的情况。
其中,归属网络,又称为归属公共陆地移动网络(home public land mobile network,HPLMN),是网络运营商为终端提供服务的归属地网络。拜访网络,又称为拜访公共陆地移动网络(visit public land mobile network,VPLMN),当终端离开归属地后,在另一个区域中“拜访”时接入的网络即为拜访网络。例如,终端的归属网络为A地,则终端在A地接入的网络切片为归属网络;当终端漫游到B地,就需要由B地的网络为其提供服务,此时,终端接入的B地的网络切片即为拜访网络。
本申请中,当终端处于归属网络时,前述实施例中的PCF为归属网络中的PCF。当终端漫游到拜访网络时,还需要考虑PDU会话(第一会话)的会话类型。当终端漫游到拜访网络,且第一会话为本地出口(local breakout)类型时,前述确定第一会话的授权流量速率的PCF为当前拜访网络中的PCF;或者,当终端漫游到拜访网络,且第一会话为归属地路由(home routed)类型时,前述确定第一会话的授权流量速率的PCF为终端的归属网络中的PCF。
在前述任意一种实施例中,PCF可以基于终端的签约数据,确定第一会话的授权流量速率,如前文,终端的签约数据除来自于终端签约到网络的过程,还可能会受到AF的控制。
示例性的,图8示出了本申请实施例提供的一种流量控制方法的信息交互示意图。如图8所示的实施例中,如图8所示,该方法包括如下步骤:
S802,AF向PCF1发送第六消息。
第六消息用于请求策略控制网元反馈目标网络区域的实际流量速率,或者,第六消息用于请求策略控制网元周期性反馈目标网络区域的实际流量速率,或者,第六消息用于请求策略控制网元在满足预设条件时反馈目标网络区域的实际流量速率。
其中,预设条件可以包括但不限于:实际流量速率与上限流量速率之间满足第一条件、第二条件或第三条件;或者,上限流量速率与世界流量速率之差小于预设的第四阈值;等,不作穷举。
其中,目标网络区域带宽数据,包括:目标网络区域的实际流量速率与上限流量速率。
在例如,第六消息中可以携带目标网络区域的标识信息,例如携带目标网络切片的S-NSSAI。
之后,PCF1、SMF1、UPF、SMF2、PCF2、UDM之间进行数据交互,执行如图8所示的S804~S820所示步骤。这些步骤的具体交互过程,以及,这些步骤的具体实现方式可以参考图7中S702~S718的描述。这里不再重复。
S822,PCF1向AF发送第七消息,第七消息携带实际流量速率。
例如,第七消息还可以携带上限流量速率。此时,如图8所示,S822步骤可以执行于S820之后。
除此之外,若第七消息未携带上限流量速率,则AF还可以通过与UDM或UDR的交互,获取到目标网络区域的上限流量速率。此时,S822步骤可以执行于S818之后。
S824,AF根据目标网络区域的上限流量速率与实际流量速率,确定第二应用信息参数。
其中,实际流量速率用于指示网络切片在目标网络区域中已接入的所有会话占用的流量速率之和,其确定方式可以参考前文,利用前述任意一种实施方式实现,这里不再重复。
本申请实施例中,第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述,后续具体说明。
S826,AF向PCF1发送第二应用信息参数。
如此,PCF1可以基于第二应用信息参数,获得终端的签约数据,并具此实现对目标网络区域的流量速率控制。
示例性的,如图8所示,该方法还包括:S828~S848步骤。如图8所示,在S828~S848中,PCF1、UDM、NWDAF、UPF、SMF1、AMF1、CN与UE之间进行交互,其具体交互过程以及这些步骤的具体实现方式,可以参考图6所示实施例中对S610~S632的描述。相较于S610~S632中的SMF与PCF,图8中执行S828~S848则是利用SMF1与PCF1来实现交互。不再重复说明。
现对AF侧所执行的流量控制方法进行说明。
如图8所示,AF可以获取目标网络切片中目标网络区域的实际流量速率,AF还根据目标网络区域的上限流量速率与实际流量速率,确定第二应用信息参数,并且,AF向PCF发送第二应用信息参数。
如前,第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述。第一应用为AF提供服务的应用。
具体而言,第二应用信息参数可以包括但不限于:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种。其中,应用业务流的带宽需求参数包括:第二签约流量速率,第二签约流量速率用于限制第一应用相关的第一会话在目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率。
具体而言,AF在执行前述S808步骤,可以在当实际流量速率与上限流量速率之间的比值大于或等于预设的目标阈值时,对第一应用信息参数进行调整,即可得到第二应用信息参数。
具体而言,当上行方向的实际流量速率与上行上限流量速率之比大于或等于预设的第一目标阈值时,AF可以对第一应用信息参数中与上行相关的参数进行调整,得到调整后的第二应用信息参数。除此之外,当上行方向的实际流量速率与上限流量速率之间的比值大于或等于第一目标阈值时,AF也可以对第一应用信息参数(包括上行相关参数与下行相关参数)进行调整,得到第二应用信息参数。
或者,当下行方向的实际流量速率与下行上限流量速率之比大于或等于预设的第二目标阈值时,AF可以对第一应用信息参数中与下行相关的参数进行调整,得到调整后的第二应用信息参数。除此之外,当上行方向的实际流量速率与上限流量速率之间的比值大于或等于第一目标阈值时,AF也可以对第一应用信息参数(包括上行相关参数与下行相关参数)进行调整,得到第二应用信息参数。其中,第一目标阈值与第二目标阈值可以相同或不同。
此外,若实际流量速率与上限流量速率之间的比值小于预设的目标阈值,则AF无需 对第一目标阈值进行调整。换言之,AF可以将第一应用信息参数确定为第二应用信息参数。这种情况下,网络侧(如UDM)中已经存储有第一应用信息参数,则AF无需向PCF发送确定的第二应用信息参数(也即第一应用信息参数)。或者,AF向PCF发送确定的第二应用信息参数亦可。
前述步骤中所涉及到的第一应用信息参数可以是AF与网络侧签约(例如,订购网络切片)时确定。第一应用信息参数可以来自于UDM或UDR。或者,第一应用信息参数也可以记录在AF可读的存储位置。
示例性的,AF可以按照如下一种或多种方式对第一应用信息参数进行调整:
降低应用会话的带宽需求参数;
降低应用业务流的带宽需求参数;
降低应用的业务优先级;
调整处于相同优先级的多个应用业务的抢占顺序;
修改部分应用会话的被抢占意愿。
示例性的一种实施例中,当目标网络区域的实际流量速率与上限流量速率之比大于或等于70%时,AF可以对第一应用信息进行调整,具体包括:将应用业务的会话带宽需求或应用业务流的带宽需求调低、修改部分非紧急重要的应用会话的属性为允许抢占、降低应用会话默认的资源抢占和保持的优先级、修改相同优先级下的抢占顺序。例如,修改相同优先级下的抢占顺序可以为:从优先抢占最先建立的业务流,修改为优先抢占使用带宽最大的业务流。如此,即可确定第二应用信息参数,并向PCF发送第二应用信息参数。
示例性的一种实施例中,当目标网络区域的实际流量速率与上限流量速率之比大于或等于70%时,AF可以降低第一签约流量速率,得到第二签约流量速率。例如,在第一签约流量速率基础上降低固定值,或按预设的第三比例缩小第一签约流量速率,得到第二签约流量速率,等,不作穷举。
如图8所示,PCF可以基于第二应用信息参数中的第二签约流量速率,确定第一会话的授权流量速率。也即,前述任意一种实施例中所涉及到的终端的签约数据,可以来自于UDM中的签约数据,或者,也可以是PCF基于第二应用信息参数确定的。
综上,通过前述任意一种实施例,PCF可以确定第一会话的授权流量速率,并据此实现对目标网络区域的流量控制。
除此之外,本申请实施例中,PCF还可以将第一会话的授权流量速率,向第二会话的控制网元发送。其中,第二会话的业务与第一会话的业务相同,和/或,第二会话所属应用与第一会话所属应用相同。如此,可以通过前述过程,实现对同类型业务的会话的流量控制,或同应用的多个会话的流量控制。
举例说明。当第一会话为APP1的视频业务的会话时,可以根据前述任意一种方式,确定第一会话的授权流量速率,如此,可以向第一会话的发起终端与第一会话的SMF发送该授权流量速率。
除此之外的另一种实施例中,还可以将同类型视频业务的会话,例如APP2的同类型视频业务的会话,作为第二会话,如此,PCF还向第二会话的发起终端与第二会话的SMF发送该授权流量速率。
除此之外的另一种实施例中,还可以将APP1的其他业务的会话,例如APP1的音频 业务的会话,作为第二会话,如此,PCF还向第二会话的发起终端与第二会话的SMF发送该授权流量速率。
需要说明的是,第二会话可以为新接入的会话,或者,也可以为已接入目标网络区域的会话。换言之,本申请实施例所提供的流量控制方法,可以通过对新接入会话与已接入会话都进行流量控制,以实现对整个目标网络区域的流量控制。
可以理解的是,上述实施例中的部分或全部步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照上述实施例呈现的不同的顺序来执行,并且有可能并非要执行上述实施例中的全部操作。
可以理解的是,以上各个实施例中,由终端实现的操作或者步骤,也可以由可用于终端的部件(例如芯片或者电路)实现,由核心网节点(例如,AMF、PCF等)实现的操作或者步骤,也可以由可用于核心网节点的部件(例如芯片或者电路)实现,由接入网设备实现的的操作或者步骤,也可以由可用于接入网设备的部件(例如芯片或者电路)实现。
图9给出了一种网络设备的实体结构示意图。网络设备可用于实现上述方法实施例中描述的PCF侧、控制网元侧或AF侧对应部分的方法,具体参见上述方法实施例中的说明。
所述网络设备900可以包括一个或多个处理器910,所述处理器910也可以称为处理单元,可以实现一定的控制功能。所述处理器910可以是通用处理器或者专用处理器等。
在一种可选地设计中,处理器910也可以存有指令,所述指令可以被所述处理器运行,使得所述网络设备900执行上述方法实施例中描述的对应于终端或者网络设备或者核心网节点的方法。
在又一种可能的设计中,网络设备900可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。
可选地,所述网络设备900中可以包括一个或多个存储器920,其上存有指令或者中间数据,所述指令可在所述处理器910上被运行,使得所述网络设备900执行上述方法实施例中描述的方法。可选地,所述存储器中还可以存储有其他相关数据。可选地处理器910中也可以存储指令和/或数据。所述处理器910和存储器920可以单独设置,也可以集成在一起。
可选地,所述网络设备900还可以包括收发器930。所述收发器930可以称为收发单元、收发机、收发电路、或者收发器等,用于实现网络设备的收发功能。
若该网络设备为PCF,用于实现对应于图4所示实施例中PCF第一会话的控制网元发送授权流量速率的操作时,例如,可以是PCF中的收发器930向SMF发送授权流量速率。收发器930还可以进一步完成其他相应的通信功能。而处理器用于完成相应的确定或者控制操作,可选的,还可以在存储器中存储相应的指令。各个部件的具体的处理方式可以参考前述实施例的相关描述。
若该网络设备为SMF,且用于实现对应于图5中的S502步骤中SMF接收来自于PCF的授权流量速率的操作时,例如,可以由SMF中的收发器930接收来自于PCF的授权流量速率。收发器930还可以进一步完成其他相应的通信功能。而处理器用于完成相应的确定或者控制操作,可选的,还可以在存储器中存储相应的指令。各个部件的具体的处理方式可以参考前述实施例的相关描述。
若该网络设备为AF,且用于实现对应于图8所示实施例中的S802步骤中AF向PCF1发送第六消息的操作时,例如可以由AF中的收发器930向PCF1发送第六消息。可选的,收发器930还可以用于完成其他相关的通信操作,处理器还可以用于完成其他相应的确定或者控制操作。可选的,还可以在存储器中存储相应的指令。各个部件的具体的处理方式可以参考前述实施例的相关描述。
本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种1C工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
可选的,网络设备可以是独立的设备或者可以是较大设备的一部分。例如所述设备可以是:(1)独立的集成电路IC,或芯片,或,芯片***或子***;(2)具有一个或多个IC的集合,可选地,该IC集合也可以包括用于存储数据和/或指令的存储部件;(3)ASIC,例如调制解调器(MSM);(4)可嵌入在其他设备内的模块;(5)接收机、终端、蜂窝电话、无线设备、手持机、移动单元,网络设备等等;(6)其他等等。
图10为本申请实施例提供的一种网络设备的结构示意图。如图10所示,该网络设备1000可以包括:处理模块1020和收发模块1040。
其中,收发模块1040,用于获取目标网络切片中目标网络区域的实际流量速率,实际流量速率用于指示网络切片在目标网络区域中已接入的所有会话占用的流量速率之和;处理模块1020,用于根据目标网络区域的上限流量速率与实际流量速率,确定第一会话的授权流量速率,授权流量速率用于指示第一会话允许的最大流量速率;收发模块1040,还用于向第一会话的控制网元发送授权流量速率。
在一种可能的实施例中,处理模块1020还用于:接收第一消息,第一消息用于请求建立第一会话或用于请求修改第一会话。
在另一种可能的实施例中,第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在另一种可能的实施例中,处理模块1020,具体用于:当实际流量速率小于上限流量速率时,将第一会话的签约最大流量速率确定为授权流量速率;或者,当实际流量速率小于或等于第一流量速率时,将第一会话的签约最大流量速率确定为授权流量速率,其中,第一流量速率小于消息上限流量速率;或者,当实际流量速率小于第一流量速率时,将第一会话的签约最大流量速率确定为授权流量速率;或者,当实际流量速率与上限流量速率 之间的比值小于或等于预设的第一阈值时,将第一会话的签约最大流量速率确定为授权流量速率,其中,第一阈值小于1;或者,当实际流量速率与上限流量速率之间的比值小于第一阈值时,将第一会话的签约最大流量速率确定为授权流量速率。
在另一种可能的实施例中,处理模块1020,具体用于:当实际流量速率小于上限流量速率时,根据第一会话的签约最大流量速率,确定授权流量速率;其中,授权流量速率小于签约最大流量速率;或者,当实际流量速率大于第一流量速率,且小于上限流量速率时,根据第一会话的签约最大流量速率,确定授权流量速率;其中,授权流量速率小于签约最大流量速率,第一流量速率小于上限流量速率;或者,当实际流量速率大于或等于第一流量速率,且小于上限流量速率时,根据第一会话的签约最大流量速率,确定授权流量速率;其中,授权流量速率小于签约最大流量速率;或者,当实际流量速率与上限流量速率之间的比值大于预设的第一阈值,且比值小于1时,根据第一会话的签约最大流量速率,确定授权流量速率;其中,授权流量速率小于签约最大流量速率;或者,当实际流量速率与上限流量速率之间的比值大于或等于预设的第一阈值,且比值小于1时,根据第一会话的签约最大流量速率,确定授权流量速率;其中,授权流量速率小于签约最大流量速率。
在另一种可能的实施例中,处理模块1020,具体用于:当实际流量速率大于或等于上限流量速率时,将第一会话的签约最小流量速率,确定为授权流量速率,或者,将目标网络切片的签约终端集合最大比特速率的最小值,确定为授权终端集合最大比特速率。
在另一种可能的实施例中,收发模块1040,还用于:接收来自于应用功能网元的第二签约流量速率,第二签约流量速率用于限制第一应用相关的第一会话在目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;第二签约流量速率根据第一签约流量速率和实际流量速率确定。
在另一种可能的实施例中,当实际流量速率大于或等于上限流量速率时,处理模块1020,还用于如下一种或多种:拒绝为第一会话分配授权流量速率;在目标网络区域中,释放非保障比特速率业务的业务质量数据流;释放目标网络区域中的低优先级会话;修改第一会话的业务质量参数,业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
在另一种可能的实施例中,收发模块1040,还用于:向第二会话的控制网元发送授权流量速率;其中,第二会话的业务与第一会话的业务相同,和/或,第二会话所属应用与第一会话所属应用相同。
在另一种可能的实施例中,目标网络区域为目标网络切片的整个覆盖区域或局部区域;其中,目标网络切片为第一会话请求接入的网络切片。
在另一种可能的实施例中,实际流量速率根据目标网络区域中N6接口的实际流量确定。
在另一种可能的实施例中,实际流量速率根据目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在另一种可能的实施例中,实际流量速率根据目标网络区域中的接入网设备在目标网络区域中的实际流量带宽确定。
在另一种可能的实施例中,收发模块1040,具体用于:接收来自于数据分析网元的第 二消息,第二消息携带目标网络区域的实际流量速率与上限流量速率;或者,接收来自于数据存储网元的第三消息,第三消息携带目标网络区域的实际流量速率与上限流量速率;或者,当目标网络区域为目标网络切片的整个覆盖区域时,接收来自于目标网络切片的整个覆盖区域中各策略控制网元的第四消息,第四消息携带策略控制网元在自身服务区域内的实际流量速率;并对各服务区域内的实际流量速率进行汇总,得到目标网络区域的实际流量速率;或者,当目标网络区域为目标网络切片中的局部区域时,接收来自于目标网络切片中的局部区域中的各接入和移动管理网元的第五消息,第五消息携带接入和移动管理网元在自身服务区域中,各接入网设备在目标网络切片中的实际流量带宽;并对各第五消息中的实际流量带宽进行汇总,得到目标网络区域的实际流量速率。
在另一种可能的实施例中,收发模块1040,具体用于:向第一会话对应的会话管理网元发送第一会话中的非保障比特速率业务的授权会话集合最大比特速率,以及,第一会话中的保障比特速率业务的授权最大比特速率;向第一会话对应的终端发送第一会话中的非保障比特速率业务的授权会话集合最大比特速率。
在另一种可能的实施例中,授权流量速率用于对目标网络区域的上行流量和/或下行流量进行控制。
图10所示实施例的网络设备可用于执行上述方法实施例中PCF所执行的技术方案,其实现原理和技术效果可以进一步参考方法实施例中的相关描述,可选的,该网络设备可以是PCF,也可以是PCF的部件(例如芯片或者电路)。
图11为本申请实施例提供的一种网络设备的结构示意图。如图11所示,该网络设备1100可以包括:处理模块1120和收发模块1140。
其中,所述收发模块1140,用于接收来自于策略控制网元的授权流量速率;其中,所述授权流量速率用于指示第一会话允许的最大流量速率,所述授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的;所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;所述处理模块1120,用于基于所述授权流量速率,对所述第一会话进行流量控制。
在一种可能的实施例中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
其中,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务和非保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有保障比特速率业务的流量速率总和的上限,或者所述授权流量速率用于指示所述第一会话包括的所有非保障比特速率业务的流量速率总和的上限。
在另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当所述实际流量速率小于或等于第一流量速率时,其中,所述第一流量速率小于消息上限流量速率;或者,当所述实际流量速率小于所述第一流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值小于或等于预设的第一阈值时,其中,所述第一阈值小于1;或者,当所述实际流量速率与所述上限流量速率之间的比值小于所述第一阈值时,所述授权流量速率为所述第一会话的签约最大流量速率。
在另一种可能的实施例中,当所述实际流量速率小于所述上限流量速率时;或者,当 所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,所述第一流量速率小于所述上限流量速率;或者,当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时;或者,当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,所述授权流量速率根据所述第一会话的签约最大流量速率确定;其中,所述授权流量速率小于所述签约最大流量速率。
在另一种可能的实施例中,当所述实际流量速率大于或等于所述上限流量速率时,所述授权流量速率为:所述第一会话的签约最小流量速率或者所述目标网络切片的签约终端集合最大比特速率的最小值。
在另一种可能的实施例中,第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率;所述第二签约流量速率来自于应用功能网元,所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定,所述第一签约流量速率来自于数据管理网元或数据存储网元。
在另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在另一种可能的实施例中,所述授权流量速率用于对所述目标网络区域的上行流量和/或下行流量进行控制。
在另一种可能的实施例中,所述处理模块1120,具体用于:控制用户面网元为所述第一会话分配质量业务流;基于所述第一会话的已经分配的质量业务流的最大流量速率,确定所述第一会话的最大流量速率;当所述第一会话的最大流量速率大于所述授权流量速率时,修改新分配的质量业务流的最大流量速率,和/或,修改所述第一会话的当前已分配的质量业务流的最大流量速率。
在另一种可能的实施例中,所述第一会话包括保障比特速率质量业务流,和/或,非保障比特速率质量业务流;所述处理模块1120,具体用于如下一种或多种:修改新分配的保障比特速率质量业务流的最大流量速率;修改所述第一会话的当前已分配的保障比特速率质量业务流的最大流量速率;修改第一会话的非保障比特速率质量业务流的最大流量速率。
在另一种可能的实施例中,所述控制网元为所述第一会话对应的终端,所述处理模块1120,具体用于:基于所述授权流量速率,对所述第一会话的上行流量速率进行流量控制。
图11所示实施例的网络设备可用于执行上述方法实施例中控制网元(终端或SMF)所执行的技术方案,其实现原理和技术效果可以进一步参考方法实施例中的相关描述。可选的,该网络设备可以是SMF,也可以是SMF的部件(例如芯片或者电路)。或者,可 选的,该网络设备可以是UE,也可以是UE的部件(例如芯片或者电路)。
图12为本申请实施例提供的一种网络设备的结构示意图。如图12所示,该网络设备1200可以包括:处理模块1220和收发模块1240。
其中,处理模块1220,用于获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;所述处理模块1220,还用于根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数;所述第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述;所述收发模块1240,用于向策略控制网元发送调整后的应用信息参数。
在一种可能的实施例中,所述第二应用信息参数,包括:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种;其中,所述应用业务流的带宽需求参数包括:第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率,第二签约流量速率指示所述第一应用相关的第一会话保证业务质量所需要的最小流量速率,和/或业务可能产生的最大流量速率。
在另一种可能的实施例中,所述处理模块1220,具体用于:当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的阈值时,对第一应用信息参数进行调整,得到所述第二应用信息参数。
在另一种可能的实施例中,所述处理模块1220,具体用于如下一种或多种:降低应用会话的带宽需求参数;降低应用业务流的带宽需求参数;降低应用的业务优先级;调整处于相同优先级的多个应用业务的抢占顺序;修改部分应用会话的被抢占意愿。
在另一种可能的实施例中,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的终端平均使用带宽和终端数量的性能统计数据确定。
在另一种可能的实施例中,所述实际流量速率根据所述目标网络区域中的接入网设备在所述目标网络切片中的实际流量带宽确定。
在另一种可能的实施例中,所述收发模块1240,具体用于:向所述策略控制网元发送第六消息;接收来自于策略控制网元的第七消息,所述第七消息携带所述实际流量速率。
在另一种可能的实施例中,所述第六消息用于请求所述策略控制网元反馈所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元周期性反馈所述目标网络区域的所述实际流量速率,或者,所述第六消息用于请求所述策略控制网元在满足预设条件时反馈所述目标网络区域的所述实际流量速率。
在另一种可能的实施例中,所述第七消息还携带所述上限流量速率。
图12所示实施例的网络设备可用于执行上述方法实施例中AF所执行的技术方案,其实现原理和技术效果可以进一步参考方法实施例中的相关描述,可选的,该网络设备可以是AF,也可以是AF的部件(例如芯片或者电路)。
应理解以上图10~图12所示网络设备中的各个模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且这些模块可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分模块以软件通过处理元件调用的形式实现,部分模块通过硬件的形式实现。例如,处理模块可以为单独设立的处理元件,也可以集成在网络设备,例如PCF的某一个芯片中实现,此外,也可以以程序的形式存储于网络设备的存储器中,由网络设备的某一个处理元件调用并执行以上各个模块的功能。其它模块的实现与之类似。此外这些模块全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。
例如,以上这些模块可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(application specific integrated circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)等。再如,当以上某个模块通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序的处理器。再如,这些模块可以集成在一起,以片上***(system-on-a-chip,SOC)的形式实现。
本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当其在计算机上运行时,使得计算机执行上述实施例所述的通信方法。
此外,本申请实施例还提供一种计算机程序产品,该计算机程序产品包括计算机程序,当其在计算机上运行时,使得计算机执行上述实施例所述的通信方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘solid state disk)等。

Claims (36)

  1. 一种流量控制方法,其特征在于,应用于策略控制网元,包括:
    获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    根据所述目标网络切片中所述目标网络区域的上限流量速率与所述实际流量速率,确定第一会话的授权流量速率或拒绝所述第一会话接入所述目标网络切片,所述授权流量速率用于指示所述第一会话允许的最大流量速率;
    向所述第一会话的控制网元发送所述授权流量速率或向终端指示拒绝所述第一会话接入所述目标网络切片。
  2. 根据权利要求1所述的方法,其特征在于,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
  3. 根据权利要求1或2所述的方法,其特征在于,所述获取目标网络切片中目标网络区域的实际流量速率,包括:
    从数据分析网元接收所述实际流量速率,或者获取所述目标网络区域中所有终端的使用带宽之和,或者获取所述目标网络区域中所述已接入的所有会话占用的流量速率之和。
  4. 根据权利要求3所述的方法,其特征在于,所述从数据分析网元接收所述实际流量速率时,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述确定第一会话的授权流量速率,包括:
    当所述实际流量速率小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述第一流量速率小于所述上限流量速率;或者,
    当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率。
  6. 根据权利要求1-4任一项所述的方法,其特征在于,所述确定第一会话的授权流量速率,包括:
    当所述实际流量速率大于或等于所述上限流量速率时,将所述第一会话的签约最小流量速率,确定为所述授权流量速率,或者,将所述目标网络切片的签约终端集合最大比特速率的最小值,确定为所述授权终端集合最大比特速率。
  7. 根据权利要求1-4任一项所述的方法,其特征在于,所述根据所述目标网络切片中所述目标网络区域的上限流量速率与所述实际流量速率,拒绝所述第一会话接入所述目标 网络切片,包括:
    当所述实际流量速率大于或等于所述上限流量速率时,拒绝所述第一会话接入网络切片。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:
    接收来自于应用功能网元的第二签约流量速率,所述第二签约流量速率用于限制第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率;所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,当所述实际流量速率大于或等于所述上限流量速率时,所述方法还包括如下一种或多种:
    在所述目标网络区域中,释放非保障比特速率业务的业务质量数据流;
    释放所述目标网络区域中的低优先级会话;
    修改所述第一会话的业务质量参数,所述业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
  10. 根据权利要求1-9任一项所述的方法,其特征在于,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
  11. 一种流量控制方法,其特征在于,执行于控制网元,包括:
    接收来自于策略控制网元的授权流量速率;其中,所述授权流量速率用于指示第一会话允许的最大流量速率,所述授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的;所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    基于所述授权流量速率,对所述第一会话进行流量控制。
  12. 根据权利要求11所述的方法,其特征在于,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
  13. 根据权利要求11或12所述的方法,其特征在于,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
  14. 一种流量控制方法,其特征在于,应用于应用功能网元,包括:
    获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数;所述第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述;
    向策略控制网元发送调整后的应用信息参数。
  15. 根据权利要求14所述的方法,其特征在于,所述第二应用信息参数,包括:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种;
    其中,所述应用业务流的带宽需求参数包括:第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率。
  16. 根据权利要求14或15所述的方法,其特征在于,所述根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数,包括:
    当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的阈值时,对第一应用信息参数进行调整,得到所述第二应用信息参数。
  17. 根据权利要求16所述的方法,其特征在于,所述对第一应用信息参数进行调整,包括如下一种或多种:
    降低应用会话的带宽需求参数;
    降低应用业务流的带宽需求参数;
    降低应用的业务优先级;
    调整处于相同优先级的多个应用业务的抢占顺序;
    修改部分应用会话的被抢占意愿。
  18. 一种网络设备,其特征在于,包括:处理模块与收发模块;其中,
    所述收发模块,用于获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    所述处理模块,用于根据所述目标网络切片中所述目标网络区域的上限流量速率与所述实际流量速率,确定第一会话的授权流量速率或拒绝所述第一会话接入所述目标网络切片,所述授权流量速率用于指示所述第一会话允许的最大流量速率;
    所述收发模块,还用于向所述第一会话的控制网元发送所述授权流量速率或向终端指示拒绝所述第一会话接入所述目标网络切片。
  19. 根据权利要求18所述的网络设备,其特征在于,所述第一会话包括保障比特速率业务,和/或,非保障比特速率业务。
  20. 根据权利要求18或19所述的网络设备,其特征在于,所述收发模块,具体用于:
    从数据分析网元接收所述实际流量速率,或者获取所述目标网络区域中所有终端的使用带宽之和,或者获取所述目标网络区域中所述已接入的所有会话占用的流量速率之和。
  21. 根据权利要求20所述的网络设备,其特征在于,所述从数据分析网元接收所述实际流量速率时,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
  22. 根据权利要求18-21任一项所述的网络设备,其特征在于,所述处理模块,具体用于:
    当所述实际流量速率小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率大于第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;其中,所述第一流量速率小于所述上限流量速率;或者,
    当所述实际流量速率大于或等于所述第一流量速率,且小于所述上限流量速率时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率与所述上限流量速率之间的比值大于预设的第一阈值,且所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率;或者,
    当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的第一阈值,且 所述比值小于1时,根据所述第一会话的签约最大流量速率,确定所述授权流量速率。
  23. 根据权利要求18-21任一项所述的网络设备,其特征在于,所述处理模块,具体用于:
    当所述实际流量速率大于或等于所述上限流量速率时,将所述第一会话的签约最小流量速率,确定为所述授权流量速率,或者,将所述目标网络切片的签约终端集合最大比特速率的最小值,确定为所述授权终端集合最大比特速率。
  24. 根据权利要求18-21任一项所述的网络设备,其特征在于,所述处理模块,具体用于:
    当所述实际流量速率大于或等于所述上限流量速率时,拒绝所述第一会话接入网络切片。
  25. 根据权利要求18-24任一项所述的网络设备,其特征在于,所述收发模块,还用于:
    接收来自于应用功能网元的第二签约流量速率,所述第二签约流量速率用于限制第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率;所述第二签约流量速率根据第一签约流量速率和所述实际流量速率确定。
  26. 根据权利要求18-25任一项所述的网络设备,其特征在于,当所述实际流量速率大于或等于所述上限流量速率时,所述处理模块,还用于如下一种或多种:
    在所述目标网络区域中,释放非保障比特速率业务的业务质量数据流;
    释放所述目标网络区域中的低优先级会话;
    修改所述第一会话的业务质量参数,所述业务质量参数包括:优先级、抢占能力与被抢占意愿中的一个或多个。
  27. 根据权利要求18-26任一项所述的网络设备,其特征在于,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
  28. 一种网络设备,其特征在于,包括:处理模块与收发模块;其中,
    所述收发模块,用于接收来自于策略控制网元的授权流量速率;其中,所述授权流量速率用于指示第一会话允许的最大流量速率,所述授权流量速率是基于目标网络切片中目标网络区域的实际流量速率与上限流量速率确定的;所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    所述处理模块,用于基于所述授权流量速率,对所述第一会话进行流量控制。
  29. 根据权利要求28所述的网络设备,其特征在于,所述目标网络区域为所述目标网络切片的整个覆盖区域或局部区域;其中,所述目标网络切片为所述第一会话请求接入的网络切片。
  30. 根据权利要求28或29所述的网络设备,其特征在于,所述实际流量速率根据所述目标网络区域中N6接口的实际流量确定。
  31. 一种网络设备,其特征在于,包括:处理模块与收发模块;其中,
    所述处理模块,用于获取目标网络切片中目标网络区域的实际流量速率,所述实际流量速率用于指示所述网络切片在所述目标网络区域中已接入的所有会话占用的流量速率之和;
    所述处理模块,还用于根据所述目标网络区域的上限流量速率与所述实际流量速率,确定第二应用信息参数;所述第二应用信息参数用于对提供服务的第一应用的带宽需求和业务优先级进行描述;
    所述收发模块,用于向策略控制网元发送调整后的应用信息参数。
  32. 根据权利要求31所述的网络设备,其特征在于,所述第二应用信息参数,包括:应用会话的带宽需求参数、应用业务流的带宽需求参数、业务优先级、相同优先级下的抢占顺序参数中的一种或多种;
    其中,所述应用业务流的带宽需求参数包括:第二签约流量速率,所述第二签约流量速率用于限制所述第一应用相关的第一会话在所述目标网络区域的最小流量速率和/或最大流量速率。
  33. 根据权利要求31或32所述的网络设备,其特征在于,所述处理模块,具体用于:
    当所述实际流量速率与所述上限流量速率之间的比值大于或等于预设的阈值时,对第一应用信息参数进行调整,得到所述第二应用信息参数。
  34. 根据权利要求33所述的网络设备,其特征在于,所述处理模块,具体用于如下一种或多种:
    降低应用会话的带宽需求参数;
    降低应用业务流的带宽需求参数;
    降低应用的业务优先级;
    调整处于相同优先级的多个应用业务的抢占顺序;
    修改部分应用会话的被抢占意愿。
  35. 一种通信***,其特征在于,包括:
    策略控制网元,用于执行如权利要求1-10任一项所述的方法;
    控制网元,用于执行如权利要求11-13任一项所述的方法。
  36. 根据权利要求35所述的通信***,其特征在于,所述通信***还包括:
    应用功能网元,用于执行如权利要求14-17任一项所述的方法。
PCT/CN2021/089038 2020-04-27 2021-04-22 流量控制方法、网络设备与通信*** WO2021218777A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21797614.1A EP4132088A4 (en) 2020-04-27 2021-04-22 TRAFFIC CONTROL METHOD, NETWORK DEVICE AND COMMUNICATION SYSTEM
US18/049,740 US20230072593A1 (en) 2020-04-27 2022-10-26 Traffic Control Method, Network Device, and Communication System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010345637.XA CN113645666A (zh) 2020-04-27 2020-04-27 流量控制方法、网络设备与通信***
CN202010345637.X 2020-04-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/049,740 Continuation US20230072593A1 (en) 2020-04-27 2022-10-26 Traffic Control Method, Network Device, and Communication System

Publications (1)

Publication Number Publication Date
WO2021218777A1 true WO2021218777A1 (zh) 2021-11-04

Family

ID=78373861

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/089038 WO2021218777A1 (zh) 2020-04-27 2021-04-22 流量控制方法、网络设备与通信***

Country Status (4)

Country Link
US (1) US20230072593A1 (zh)
EP (1) EP4132088A4 (zh)
CN (1) CN113645666A (zh)
WO (1) WO2021218777A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117572838A (zh) * 2024-01-17 2024-02-20 青岛创新奇智科技集团股份有限公司 一种基于工业大模型的自动调整生产线速度的方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023141964A1 (en) * 2022-01-28 2023-08-03 Lenovo (Beijing) Limited 5gs assisted adaptive ai or ml operation
CN114710811A (zh) * 2022-04-07 2022-07-05 中国联合网络通信集团有限公司 数据流转发方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045511A1 (zh) * 2016-09-07 2018-03-15 华为技术有限公司 接入控制方法和装置
CN108347736A (zh) * 2017-01-25 2018-07-31 维沃移动通信有限公司 资源共享的控制方法、执行实体及资源共享配置实体
CN109041138A (zh) * 2017-08-11 2018-12-18 华为技术有限公司 通信方法及源基站、目标基站、核心网设备、终端设备
CN109743213A (zh) * 2019-02-28 2019-05-10 腾讯科技(深圳)有限公司 一种网络切片处理方法和设备以及***
US20190215730A1 (en) * 2018-01-11 2019-07-11 Weihua QIAO Monitoring and Reporting Service Performance
CN110391926A (zh) * 2018-04-20 2019-10-29 ***通信有限公司研究院 网络切片应用控制方法及装置、通信设备及存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109891829B (zh) * 2016-10-18 2022-04-15 瑞典爱立信有限公司 网络切片中的sla处理
JP2020530703A (ja) * 2017-08-11 2020-10-22 コンヴィーダ ワイヤレス, エルエルシー 通信ネットワークにおけるネットワークデータ分析

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045511A1 (zh) * 2016-09-07 2018-03-15 华为技术有限公司 接入控制方法和装置
CN108347736A (zh) * 2017-01-25 2018-07-31 维沃移动通信有限公司 资源共享的控制方法、执行实体及资源共享配置实体
CN109041138A (zh) * 2017-08-11 2018-12-18 华为技术有限公司 通信方法及源基站、目标基站、核心网设备、终端设备
US20190215730A1 (en) * 2018-01-11 2019-07-11 Weihua QIAO Monitoring and Reporting Service Performance
CN110391926A (zh) * 2018-04-20 2019-10-29 ***通信有限公司研究院 网络切片应用控制方法及装置、通信设备及存储介质
CN109743213A (zh) * 2019-02-28 2019-05-10 腾讯科技(深圳)有限公司 一种网络切片处理方法和设备以及***

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on enhancement of network slicing; Phase 2 (Release 17)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 23.700-40, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.3.0, 30 January 2020 (2020-01-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 62, XP051860860 *
HUAWEI, HISILICON: "Solution of Key Issue #2: Support of network slice related quota on the maximum number of PDU sessions", 3GPP DRAFT; S2-2001649, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Incheon, Korea; 20200113 - 20200117, 17 January 2020 (2020-01-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051844348 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117572838A (zh) * 2024-01-17 2024-02-20 青岛创新奇智科技集团股份有限公司 一种基于工业大模型的自动调整生产线速度的方法
CN117572838B (zh) * 2024-01-17 2024-04-05 青岛创新奇智科技集团股份有限公司 一种基于工业大模型的自动调整生产线速度的方法

Also Published As

Publication number Publication date
EP4132088A4 (en) 2023-10-04
CN113645666A (zh) 2021-11-12
EP4132088A1 (en) 2023-02-08
US20230072593A1 (en) 2023-03-09

Similar Documents

Publication Publication Date Title
WO2021218777A1 (zh) 流量控制方法、网络设备与通信***
EP3471355B1 (en) Communication network congestion control using allocation and retention priority
EP4037422A1 (en) Method and device for providing service to user device by using network slice in communication system
EP1834449B1 (en) Priority bearers in a mobile telecommunication network
US9003004B2 (en) Group-based control method and apparatus for MTC devices in mobile communication system
TWI528848B (zh) 長期演進系統中支援上鏈匱乏避免方法及裝置
KR101534902B1 (ko) 지연 시간을 지정하는 거부 응답의 제공
RU2391800C2 (ru) Выделение ресурсов в системе связи
WO2016091298A1 (en) Updating flow-specific qos policies based on information reported from base station
US20230019215A1 (en) TSC-5G QoS MAPPING WITH CONSIDERATION OF ASSISTANCE TRAFFIC INFORMATION AND PCC RULES FOR TSC TRAFFIC MAPPING AND 5G QoS FLOWS BINDING
US11330605B2 (en) Systems and methods for radio access network-level allocation and retention priority based on network slicing
US11824783B2 (en) Maximum data burst volume (MDBV) determining method, apparatus, and system
WO2022166559A1 (zh) 通信方法及装置
WO2022012361A1 (zh) 一种通信方法及装置
WO2021115429A1 (zh) 一种通信方法及装置
CN111919501A (zh) 专用承载管理
US20220330080A1 (en) Communication method, apparatus, and system
US20220210690A1 (en) Data transmission method and apparatus, system, and storage medium
US20220256395A1 (en) Communication method, apparatus, and system
CN113630778A (zh) 一种QoS流的动态控制方法及终端
WO2019158034A1 (zh) 一种资源分配方法和装置
WO2024032603A1 (zh) 一种通信方法及装置
WO2023212960A1 (zh) 扩展现实业务策略实现方法及装置
WO2023010994A1 (zh) 一种网络切片接入控制方法及通信装置
WO2024113069A1 (en) Systems and methods for quality of service handling for extended reality traffic

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21797614

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021797614

Country of ref document: EP

Effective date: 20221102

NENP Non-entry into the national phase

Ref country code: DE